You are on page 1of 20

Table of Contents

Table of Contents........................................................................................1
QUESTION 1.................................................................................................2
Question 2.................................................................................................11
Reference..................................................................................................20

Page 1 of 20
QUESTION 1
Nowadays, Internet has become one of necessity for many
people. Internet is used for various activities like online
banking, information sharing, teleworking, entertainment,
and other services. To enable Internet access, a network
connectivity is required. You were assigned to develop a
networking solution for a new condominium project. The
building has 20 floors with 10 houses per floor. Answer
following questions to prepare your solution.

Part (A) Discuss three (3) current networking


technologies in the market. Which networking
technology is popular and why?
Ethernet
Ethernet is the most widely installed local area network (LAN) nowadays.
It was developed by Xerox Corporation in coorperation with DEC and Intel
in 1976.

The first commercial Ethernet was run on a shared thick coax cable to
which each station was attached. Thick coax provides a wide bandwidth
and good resistance to electromagnetic interference (EMI). It was denoted
as 10BASE5, signified a 10-Mbps data rate. But thick coax, which has a
diameter similar to a garden hose, is heavy and has a large minimum
bend radius. Thick coax is difficult to work with and its layout designs are
rather inflexible.

Originally, the Ethernet protocol known as Carrier Sense Multiple Access


with Collision Detection (CSMA/CD) governed the way the computer
shared the channel. It can handle multiple accesses. When a station
wanting to use the medium, it must first listen for activity on the bus; if
the bus is being used, the station will hear the transmission (sense the
carrier) and have to wait; if the bus is idle, the station can transmit
immediately. After it transmit a frame, it must stop and repeat the
CSMA/CD procedure to prevent it from monopolizing the LAN by
transmitting continuously, which would block access by other stations.

In 1985, a thin coax version of Ethernet, called thinnets was released.


With a diameter about a pencil, thin coax maintains the EMI resistance of
thick coax but offers many advantages over its thicker counterpart. The
principal benefits are easier installation, cost reduction and elimination of
a separate piece of equipment. The tradeoff was reduction in the

Page 2 of 20
maximum segment span. Designated 10Base2, segments cannot exceed
185 meters. No more that 30 notes are allowed per segment.

The next substantial improvement was moving from a physical bus to a


physical star. A central hub distributes signals from one station to all of
the others. Cabling changed to the thinner, lighter, and more flexible
unshielded twisted pair (UTP), and the designation changed to 10Base-T.
Several advantages accrued, which are reliability improved, Management
improved and maintenance improved. A more dramatic improvement
came from replacing the hub with a switch.

Token Ring
Token ring was created and patented by Olof S. Soderblom in the late
1960. In the 1970s, it was positioned as a LAN that did not suffer from
throughput degradation due to collisions and that had predictable and
acceptable performance under all loading conditions, accomplishments
that the Ethernet of that era could not match.

The most common configuration of token ring is a physical star/logical ring


formed by connecting each station to a multistation access unit (MAU) at
the star center. Cabling usually is category 4 twisted-pair wires, although
fiber also is possible.

Logical topology requires operation as a point-to-point link between each


node and its two immediate neighbours. This logical linkage forms a ring
that can be implemented as a physical ring, bus, or star.

A small packet called a token controls medium access. Operationally, the


token circulates around the ring, visiting each station in turn. When a
station receives a token, if it does not have a frame to transmit, it
regenerates the token and sends it on; otherwise, it creates a data frame
and sends that out.

As a data frame circulates around the ring, it is read by each station in


turn and, if destined for another station, it is regenerated and sent out. At
the destination station, the frame is marked as read and sent back out
again. It eventually gets back to the original sender who now notes that
the message was received by the destination station. The sender can
then removed the message and free that token for use by others.

Initially token ring operate at a speed of 4Mpbs. Although this seems slow
compared to the original 10 Mbps Ethernet, but token ring was actually
faster in operation under heavy loads. This is because there are no
collisions, and every station gets a turn at a token.

In 1989, the data transfer rates for token ring was boosted to 16 Mbps and
the possibility of two token circulating at the same time. Nevertheless, it
was overtaken by Ethernet, whose steady improvements, low cost,
simplicity, ease of installation, and widespread cadre of knowledgeable
practitioners led to token ring declined in popularity.

Page 3 of 20
In 1997, a group of manufacturers tend to regain the market share. The
High Speed Token Ring Alliance was formed to push IEEE for higher speed
standards. One result was 100 Mbps token ring, released in 1998. But it
was too late. It didn’t have much of an impact in the typical business
environment, because by then Ethernet had eliminated the collision issue
and was operating at higher speeds. Later, a 1-Gbps token ring was
published but it didn’t find many takers.

ATM
Asynchronous transfer mode (ATM) is a high-speed switching technology
used to provide services for LANs and WANs alike. It is commonly used to
supply backbone network capabilities and to provide high-bandwidth
communication between nodes for transmission of full-motion video with
voice and computer-aided design applications. ATM was developed as
part of the broadband ISDN specifications. Originally, ATM speeds were
set at 155 and 622 Mbps but other speeds such as 25 and 45 Mbps are
available, and very-high-speed switches allow transmissions faster than
1Gbps.

ATM uses high-speed digital switches, fiber optic cables, and full-duplex
transmission to attain its high throughput. ATM network transmit small,
fixed-size frames called cells. A cell is 53 bytes long and usually carries 47
or 48 bytes of data; the remaining 5 or 6 bytes is called the header. The
header is used to provide flow control, cell type identification, addressing
and error-checking. In setting up ATM on a LAN, additional equipment,
such as switches, cabling and channel service unit/data service unit
(CSU/DSU), must be deployed.

ATM specifies four protocols, each of which is oriented to a specific class of


service. These protocols are called adaptation leyers and are designated
AAL-1, AAL-2, AAL-3/4 and AAL-5. The adaptation layers are designed to
identify and support various classes of services, such as a constant bit
rate for video and voice (AAL-1); time-sensitive variable bit rates for
packetized voice (AAL-2); transmissions where delays can be tolerated,
but error-checking is important (AAL-3/4); and services similar to AAL-3/4
but with a reduced need for error checking (AAL-5).

Conlusion
Nowadays, the most popular networking technology is Ethernet LAN. This
is because Ethernet LAB strikes a good balance between speed, cost, and
ease of installation compared to other network technology.

Page 4 of 20
Part (B) Describe three (3) criteria for selection of a
network backbone. Draw the schematic diagram of the
network backbone that you proposed for this project.
A network backbone is a part of network infrastructure that connects
several local area networks. The performance of the LAN will be very
depending on the implementation of the network backbone. The main
criteria for selection of a network backbone are topology, protocol and
media.

Network topology

Star Network Ring Network Bus Network

Network topology is the network architecture used to interconnect the


networking equipment. A network can be arranged or configured in
several different arrangements. There are three principle network
topologies, which are namely star, bus and ring.

The star topology is the most common networking in today’s LANs. In star
network, a number of computer or peripheral devices are connected to a
center unit which is either a hub or a switch. If a user want to send data
to the network printer, the hub or switch provide the network connection.

In bus network, a coaxial cable is looped through each networking device


to facilitate data transfer. All LAN data traffic is carried over this cable
link. As the information passed along the bus, it is examined by each
device to see if the information is intended for it. The bus topology is
seldom used in modern computer network as it is only suitable to link up a
few computers.

In a ring network, each device is connected to two other devices, forming


a ring. Messages are passed around the ring as an electrical “token” until
they reach the correct destination. If a user wants to transmit, the
computer waits until it has possession of the token. Ring topology is
seldom used nowadays due to the difficulties on maintenance and
troubleshooting.

Page 5 of 20
Network Protocol
Network protocol is a set of rules established for user to gain control of the
network to exchange information. In order for two computers to talk to
each other, they must be speaking the same language.

There are many different types of network protocols and standards to


ensure that a computer can communicate with another computer. For
example: TCP/IP (for UNIX, Windows and other platforms), IPX (for Novell
NetWare), AppleTalk (for Macintosh computer), NetBIOS/NetBEUI (for LAN
manager and Windows NT networks), and etc.

Network media

Twisted Pair Cable Coaxial Cable Fiber Optic Cable

Network media is the communication channel between different computer


and networking devices. These channels actually carry the data from one
computer to another. There are two categories of communication
channels. One category connects sending and receiving devices by
providing a physical connection such as a wire or cable. The other
category is wireless.

Physical media use a solid medium to connect sending and receiving


devices. These media include twisted pair cable, coaxial cable, and fiber-
optic cable.

Currently, the most commonly used medium in network is twisted pair.


One wire carries signal, and the other is the ground. The wire are
insulated and twisted around each other in a spiral fashion to reduce
crosstalk from external radiation. Within a cable bundle, it may contain
from two pair two thousands of pairs. Twisted pair comes in two basic
varieties – unshielded (UTP) and shielded (STP).

Coaxial cables are concentric. A wire conductor running through the


centre of the cable (axially) is surrounded (co-axially) by a conducting
braided metal or foil shield, protected by an outer jacket. Coaxial cable
offer much greater capacity for carrying signals and is relatively immune
to external sources of interference. But, coax is more bulky than any
variety of twisted pair. It is more difficult to install. It has larger minimum
bend radius, making it harder to snake around obstacles. Coax also more
costly.

Page 6 of 20
Fiber optic cable transmits data as pulses of light through tiny tubes of
glass. It has over 26,000 times the transmission capacity of twisted pair.
However, it is significantly smaller. A fiber optic tube can be half the
diameter of a human hair. Such cables are immune to electronic
interferences, which makes them more secure. Compared to coaxial
cable, they are lighter and more liable at transmitting data. They transmit
information using beams of light at light speeds making tem far faster
than copper cable.

Wireless connections do not use a solid substance to connect sending and


receiving devices. They use the air as a medium to transmit data.
Primary technologies used for wireless connections are Wi-Fi, Bluetooth,
Infrared, broadcast radio, microwave, and satellite.

Proposed Network Backbone


The network backbone proposed for the 20 floors will be using star
topology because of it greater maintainability and expandability.

For the network media, we will be a using twisted pair cable as it can
provide high performance and ease of installation. Wireless medium will
be using together to provide greater mobility.

TCP/IP will be used as the network protocol on this proposed network


because it is widely supported and is included in operating systems such
as Windows, Mac OS, Unix and Linux. It is suite to use for communications
between hosts in most local networks and the Internet.

Below is the network diagram for the proposed network backbone.

Internet
12 Port Switchs at All Floor

100Mbps
Ethernet Cable
To Each Floor

Broadband Router 24 Port Switch

Proxy Server

Proposed Network Backbone

Page 7 of 20
Part (C) Identify what are networking equipments that
will be used to enable access to each tenants at every
floor. Justify (explain) why you choose the network
equipments. Show in a diagram, how you connects the
network equipment to the backbone.

20th Floor

19th Floor

18th Floor

4th Floor
To
17th Floor
having the
same
layout

rd
3 Floor
Wireless Access Point
nd
2 Floor
16 Port Switch

st
RJ45 Socket 1 Floor

100Mbps Cat-5 Ethernet


Cable Network Backbone Server Room
Internet

Proposed Network Connection for 20 Floor Condominium

The above diagram shows the proposed network connection for the 20
floor condominium. The Cat-5 UTP cable will be pulled from the main
switch at the server room to the switch at each floor. At each floor the
UTP cable will be lay from the switch to each lot’s RJ45 socket and two
wireless access points.

All the equipment used will be summarized in the table below.

Broadband Modem Router


This router is used to route the local area network
to the internet. This router will be provided by
the internet ISP.
Proxy Server
The purpose to install a proxy server is to control
the bandwidth and traffic of each network
connection to ensure that the internet bandwidth
can be fully utilized by all the users. It also
serves as a firewall to protect the local area

Page 8 of 20
network.
Cisco 24 port switch
This switch provides connection to the switch at
each of the twenty floors. We are using a Cisco
switch because this is the backbone of the
network. We the best performance device.
16 ports switch
This 16 port switch will be located at each floor to
provide the network connection from the
backbone switch to the Wireless AP and RJ45
socket at every lot. We used 16 ports switch
because only 13 ports are needed at each floor.
The other three served at standby port.
Wireless Access Point
Two wireless access points will be installed at
each floor so that the whole floor will be covered
by the wireless signal. Wireless APs provide the
Wi-Fi internet to all the users in the condominium.
RJ45 socket
A RJ45 socket will be installed at every lot to
provide a more stable internet connection to the
users. The users can expand their home network
by connecting their own LAN or Wireless LAN to
the RJ45 socket to get the internet connection.
Cat-5 UTP cable
Cat-5 UTP cable is used as the networking
medium from the server room to each floor and
then into each condominium lot. UTP cables
provide high performance with lower cost. It is
more flexible to lay around as it has the minimum
bend radius.

Page 9 of 20
Part (D) List the Internet access services that are
available in Malaysia, which one that you find the best
for this project. State the reason (why?)
In Malaysia, the internet access services can mainly be divided in to two
types. The main difference of these two types is the transport media.
They are namely fixed line internet services and wireless internet services.

The fixed line internet service is provided by TM, the Malaysia dominant
telecommunication provider. TM provides several types of internet service
packages to home, business and corporate users. These services are
namely 1515 dial-up internet, Streamyx Broadband, ISDN, Lease Line,
Business Broadband and Direct Broadband. The internet access speed
range from the 1515 dial up of 56Kbps to Direct Broadband of 1Gbps.

The wireless internet service is provided by the three major mobile


communication providers in Malaysia which are Celcom, Maxis and Digi.
The wireless broadband internet services is provided using their GPRS,
EDGE, 3G and 3GX network with speed up to 3.6Mbps.

For this condominium project, I will be using the TM Direct Broadband


155Mbps. TM is the only internet access provider that can provide
internet service up to 1Gbps. Streamyx and others wireless broadband
will not be considered as they only provide speed up to 4 Mbps, this
bandwidth is only enough to a few user.

For this project, the 155Mbps bandwidth is just enough to accommodate


the usage of 200 families in the condominium. Actually, If the all the 200
families is online together using 1M bandwidth 155Mbps won’t be enough.
But due to the cost constraint, we can only subscribe for the 155Mbps line.
We will be using a proxy server to average up the bandwidth. So, that all
the users can enjoy an average acceptable speed and the line will not be
congested by just a few heavy users.

Page 10 of 20
Question 2
Networking technology consist of various elements such as
network equipments, protocols, concepts, techniques,
standards, topology, industry player, etc. Answer following
questions.

Part (A) Open System Interconnection (OSI) reference


model was introduced earlier before TCP/IP was
created. List and describe the function of every layers
in OSI and TCP/IP. Explain why layering techniques were
used in designing a network protocol?
Open system interconnection (OSI) reference mode was developed by the
International Organisation for Standardization (ISO) in 1984. The model
describes how information from an application in one computer moves
through a network medium to an application on another computer.

The OSI model contains seven layers where each layer representing a
group of related logical functions. The seven layers as defined by the
group are summarized in the followings diagram.

Page 11 of 20
TCP/IP (Transmission Control Protocol/Internet Protocol) is the protocol
suite used for communications between hosts in most local area networks
and the Internet.

The Transmission Control Protocol was first proposed in 1974 in paper. In


1978, the suite of protocols called TCP/IP was introduced. In 1983, TCP/IP
replaced the Network Control Protocol (NCP) as the standard networking
protocol used by Arpanet, considered the predecessor to today’s internet.

Page 12 of 20
TCP/IP model consists of four layers which are application, transport,
internet and network interface. Each of these layers has their own
purposes as described in the table below.

Page 13 of 20
Layering Technique
Why we need layering in the networking model? Let’s think about
communication over network. There is great complexity entailed in the
design and operation of a network. Many companies are involved in
developing and producing hardware and software to run on network.

Therefore, the main intention of the layering is to provide a framework for


networking that ensures compatibility in the network hardware and soft
ware development.

In the layering model, the various tasks that a network has to perform
were break down into separate logical procedures, so that the network
operation was divided into a number of functions. Then, the function was
grouped and the groups interface was specified.

In that way, the means for carrying out the tasks of a function group are
left to the designers, while the connections between particular groups are
standardized so that they can operate smoothly together. This can also
help to accelerate the development of new networking technologies.

Page 14 of 20
Part (B) Explain what is Personal Area Network (PAN),
give an example of a technology that uses PAN and how
it operates.
Personal area network (PAN) is a personal connectivity to accommodate
data sharing and connectivity needs of small, often impromptu groups of
people. The “personal” in PAN refers to its very limited span, so the
devices are “close to person”

PAN provides connection between laptops, mobile phone, PDA, mp3


player, camera and so on the share data in an ad hoc network. As such, it
has limited use in the corporate world and, as it generic name implies, is
much more likely to be used by individuals.

PAN connection can be established using cable or wireless technology.


The common types of cable for PAN connection are USB and Firewire.
Whereas the wireless PAN technology are Infrared and Bluetooth. The
predominant PAN technology today is Bluetooth.

Bluetooth is a relatively new technology, not even 10 years old. It was


first created by Ericsson Mobile Communication; it was named for Harald
Bluetooth.

Bluetooth uses radio waves for transmission over a very short range of
around 30 to 40 feet. Recent developments have extended the range to
nearly half a mile by increasing transmission power and using special
antennas.

The original impetus for its design was to replace the clutter of desktop
cables by enabling wireless connection between keyboards and
computers, computers and printers, headphones and sound cards, and the
like. Before long, that concept expanded to the creation of a personal
area network (PAN), a mini-network among devices in close proximity.

Bluetooth networks operate with a master/slave relationship – one device


automatically assumes the role of master through which all
communication travel; assignment is ad hoc. Bluetooth-enabled devices,
including laptops, mobile phone, digital cameras, and PDAs, can join an
existing group or form a new one just by being turned on.

A Bluetooth group is called a personal area network (PAN). Its members


can come and go on the fly. The basic Bluetooth PAN is called a piconet,
which needs at least two active members and can have up to eight.
Piconets are established automatically on the fly – as a device enters a
piconet with fewer than eight active members, it is given an address – and
members can come and go at will.

Page 15 of 20
Bluetooth is based on the IEEE 802.11 standard, as WLANs are, and
operates in the same ISM 2.4GHz band as 802.11b and g. However,
Bluetooth does not use the 802.x LAN protocols because it is not designed
for large-scale data transmissions. Bluetooth uses FHSS. There are two
major advantages of FHSS. Firstly, the interference with and from other
spread spectrum networks within range is reduced. Secondly
eavesdropping prevention is enhanced.

Page 16 of 20
Part (C) Discuss the advantages and disadvantages of
normal LAN vs. wireless LAN.
LAN has been widely used within organizations and homes. LAN allow
different computer to share resources. Computer can be connected in a
variety of ways including electrical wiring, telephone wiring, and special
cables. Today, with the advancement of wireless technology, one of the
simplest ways to connect computers is without cable or wireless.

A wireless local area network is typically referred to as a wireless LAN


(WLAN). It uses radio frequencies to connect computers and other
devices. All communications pass through the network’s centrally located
wireless receiver. This receiver interprets incoming radio frequencies and
routs communication to the appropriate devices.

Both normal and wireless can claim advantages over the other. Below we
can compare advantages and disadvantages of wired and wireless
networking in few key areas.

Ease of installation
The installation for normal LAN is more difficult compared to WLAN. For
normal LAN, Ethernet cables must be run from each computer to another
computer or to the central device. It can be time-consuming and difficult
to run cables under the floor or through walls, especially when computers
sit in different rooms.

WLAN is easier to install, you no need to worry about how to run the wires
in your building. WLAN just require wireless network adapters and a
wireless access point. You just need to install in a central location where
wireless radio signals can reach your all your computers with minimal
interference. If your building area is too big, you just need to add another
wireless access point at another location as a repeater.

Total cost
WLAN cost is more expensive than normal LAN. As for normal LAN,
Ethernet cables, Ethernet card, hubs and switches are very inexpensive.
Wireless devices cost are more than the equivalent wired Ethernet
products. At full retail prices, wireless adapters and access points may
cost three or four times as much as Ethernet adapter, cable and
hubs/switches.

Performance
At the performance wise, normal LAN offer better performance compare to
WLAN. With Fast Ethernet technology, a normal LAN can easily offer
speed at range of 100Mbps to 1Gbps.

Wireless LANs using 802.11b support a maximum theoretical bandwidth of


11Mbps and 802.11g WLANs support up to 54Mbps, which is

Page 17 of 20
approximately one-half the bandwidth of Fast Ethernet. Futhermore, Wi-Fi
performance is distance sensitive, the performance will degrade on
computers farther away from the access point. As more wireless devices
utilize the WLAN more heavily, performance degrades even further.

Mobility and Expandability


The greater mobility of WLANs helps offset the performance disadvantage.
Mobile computers do not need to be tied to an Ethernet cable and can
roam freely within the WLAN range. For normal LAN, the LAN point is
fixed. We need to rearrange the cable if we need to move our computer
to other location, which is a tedious job.

Furthermore, WLAN provide better expandability, where a new computer


can be easily connected to the WLAN within the wireless range. Unlike
normal LAN, if you need to connect another new computer to the LAN, you
need to pull another network cable to the central switch.

Security
In theory, WLANs are less secure than normal LANs, because wireless
communication signals travel through the air and can easily be
intercepted. But, in practical, WLANs protect their data through the Wired
Equivalent Privacy (WEP) encryption standard that makes wireless
communications reasonably as safe as wired ones.

No computer network is completely secure. Important security


considerations for computer user tend to not be related to whether the
network is wired or wireless but rather ensuring that internet firewall is
properly configured, and user knowledge on internet spam, viruses and
spyware.

Table below summarizes the main criteria discussed above.

Normal LAN WLAN


Installation Moderate difficulty Easier
Cost Less More
Performance Superior Reasonably high
Mobility / Limited Outstanding
Expandability
Security Reasonably good Reasonably good

As a conclusion, normal Ethernet LAN is probably for users that are very
cost-conscious, need maximum performance of the network system, and
don’t care much about mobility.

On the other hand, a WLAN is for users if cost is less of an issue, like being
an early adopter of leading-edge technologies and really concerned about
the task of wiring their home or small business with Ethernet cable.

Page 18 of 20
Part (D) Subnetting is a technique that can be
implemented in a LAN. Explain what is subnetting and
describe why we need to do subnetting. Give an
example of a subnetmask address for a class C IP
network.
Subnetting is a technique used to breakdown networks into subnets. The
subnets are created through the use of subnet masks. The subnet mask
identifies what bits in the IP address are to be used to represent the
network/subnet portion of an IP address.

Subnets are created by borrowing bits from the host portion of the IP
address. The network portion of the IP address and the new subnet bits
are used to define the new subnet.

Here is an example to demonstrate how to do the subnetting. ABC


company Using a class C IP address 196.1.1.0. They need to divide their
network into 6 departments. Each department will require its own subnet.
Each department LAN requirement are:

o Admin 25 nodes

o Account 10 nodes

o Executive 15 nodes

o Logistic 5 nodes

o Management 10 nodes

o Training 20 nodes

From here we can see that 6 subnet is needed. We add 2(for network and
broadcast addresses) to 8. The nearest power of two is 8, which equal 23.
This means a 3-bit subnet mask is required.

Reserving three bits from the top down creates a subnet mask with the
pattern 11100000. The decimal value for this number is 128+64+32
which is equals to 224. This extends the default subnet mask for the Class
C address from 255.255.255.0 to 255.255.255.224.

The number of usable host per subnet can be calculated with the formula
2m – 2 where m is the number of host bit left. 25 – 2 = 30. Therefore, the
number of host per subnet is 30, which is enough to accommodate all the
department requirements.

All the subnets addresses is listed at the table below:

Page 19 of 20
Network IP: 196.1.1.0 Subnet mask: 255.255.255.224

Usable Subnet Subnetwork Host Range Broadcas


Subnet # IP t
Not in used 0 Subnet 196.1.1.0 196.1.1.1 - 196.1.1.31
196.1.1.30
Admin 1st 196.1.1.32 196.1.1.31 - 196.1.1.63
Subnet 196.1.1.62
Account 2nd 196.1.1.64 196.1.1.65 - 196.1.1.95
Subnet 196.1.1.94
Executive 3rd 196.1.1.96 196.1.1.97 - 196.1.1.12
Subnet 196.1.1.126 7
Logistic 4th 196.1.1.128 196.1.1.129 - 196.1.1.15
Subnet 196.1.1.158 9
Manageme 5th 196.1.1.160 196.1.1.161 - 196.1.1.19
nt Subnet 196.1.1.190 1
Training 6th 196.1.1.192 196.1.1.193 - 196.1.1.22
Subnet 196.1.1.222 3
Not in used 7th 196.1.1.224 196.1.1.225 - 196.1.1.25
Subnet 196.1.1.254 5

Reference
Barry Dumas and Morris Schwartz. Principles of computer networks and
communications, Upper Saddle River, NJ: Pearson/Prentice Hall, 2009

Jeffrey S. Beasley. Networking. Upper Saddle River, NJ: Pearson/Prentice


Hall, 2004

Laura A. Chappell and Ed Tittel. Guide to TCP/IP, 2nd edn, Canada:


Thomson Learning, 2004

David A. Stamper. Local Area Networks,3rd edn. Upper Saddle River, NJ:
Pearson/Prentice Hall, 2001

Brian K. Williams and Stacey C. Sawyer. Using information Technology.


New York: McGraw-Hill Higher Education, 2003

Page 20 of 20

You might also like