Tải bản đầy đủ (.docx) (27 trang)

1 unit 2 assignment brief

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (1.73 MB, 27 trang )

Assignment Brief 1 (RQF)
Higher National Certificate/Diploma in Computing
Student Name/ID Number:
Unit Number and Title:

Unit 2: Networking

Academic Year:

2021 – 2022

Unit Assessor:

Van Ho

Assignment Title:

Networking Infrastructure

Issue Date:

April 1st, 2021

Submission Date:
Internal Verifier Name:
Date:
Submission Format:
Format:
● The submission is in the form of an individual written report. This should be written in a concise,
formal business style using single spacing and font size 12. You are required to make use of
headings, paragraphs and subsections as appropriate, and all work must be supported with


research and referenced using the Harvard referencing system. Please also provide a bibliography
using the Harvard referencing system.
Submission
● Students are compulsory to submit the assignment in due date and in a way requested by the
Tutor.
● The form of submission will be a soft copy posted on />● Remember to convert the word file into PDF file before the submission on CMS.
Note:
● The individual Assignment must be your own work, and not copied by or from another student.
● If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you
must reference your sources, using the Harvard style.
● Make sure that you understand and follow the guidelines to avoid plagiarism. Failure to comply
this requirement will result in a failed assignment.
Unit Learning Outcomes:

1


LO1 Examine networking principles and their protocols.
LO2 Explain networking devices and operations.
Assignment Brief and Guidance:
Assignment scenario
You are employed as a network engineer by Nguyen Networking Limited, a high-tech networking
solution development company, which has branches in Ho Chi Minh City, Hanoi, Da Nang and Can
Tho. The company has been contracted to implement a networking project from a local educational
institute. The specification of the project is given below:


People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher managers




including the academic heads and the programme managers, and 3 computer network
administrators.
Resources: 50 student lab computers, 35 staff computers, and 3 printers.



Building: 3 floors, all computers and printers are on the ground floor apart from the IT labs –
one lab located on the first floor and another located on the second floor.

Task 1
The CEO of the company, Mr. Nguyen, has asked you to investigate and explain networking principles,
protocols and devices and submit a report.
You will need to produce a report that includes the following:


An introduction to provide an overview of your report.



Benefits and constraints of different types of networks and networking standards.



The impact of network topology, speed of communication and bandwidth requirements.



Effectiveness of networking systems.




Discussion on operating principles of networking devices and server types and networking



software.
Discuss the relationship of workstation hardware with networking software.



Explore a range of server types and justify the selection of a server, considering a given scenario



regarding cost and performance optimization.
For the given specification, identify the topology protocol for the efficient utilization of a
networking system.

2


Learning Outcomes and Assessment Criteria (Assignment 1):
Learning Outcome
Pass
Merit
LO1
P1 Discuss the
M1 Compare
benefits and

common networking
constraints of different principles and how
network types and
protocols enable the
standards.
effectiveness of
networked systems.
P2 Explain the impact
of network topology,
communication and
bandwidth
requirements.
LO2

P3 Discuss the
operating principles of
networking devices
and server types.
P4 Discuss the interdependence of
workstation hardware
with relevant
networking software.

M2 Explore a range
of server types and
justify the selection of
a server, considering a
given scenario
regarding cost and
performance

optimisation.

3

Distinction
D1 Considering a
given scenario,
identify the topology
protocol selected for
the efficient utilization
of a networking
system.


Contents

List of Figure

P1. Discuss the benefits and constraints of different network types and standards
1. Network Definition
A network is defined in information technology as the connecting of at least two computer systems
via a cable or wireless connection. The most basic network consists of two computers linked by a
cable. Peer-to-peer networks are the name for this form of network. In this network, there is no
hierarchy; both participants have equal privileges. Each computer has access to the other's data and
can share resources including disk space, software, and peripheral devices (printers, etc.). Today's
networks are a little more complicated, and they aren't merely made up of two computers. Clientserver networks are commonly used in systems with more than ten players. A central computer
(server) in these networks distributes resources to the other network participants (clients).

Figure 1 – Network Definition
(WELCOME TO THE NORMAN NETWORK | NORMAN, 2022)

1.1 LAN (Local Area Network)
The LAN, or Local Area Network, is a network that allows personal computers and workstations to
share data, tools, and programs. A switch, or stack of switches, connects a set of computers and
devices using a private addressing system provided by the TCP/IP protocol. In comparison to other
computers on the local network, private addresses are unique. Routers are located at the LAN's
4


edge, linking it to the broader WAN. Because the number of computers connected is limited, data is
transmitted at a very quick rate. The connections must, by definition, be high-speed and hardware
must be reasonably inexpensive (Such as hubs, network adapters, and Ethernet cables). LANs are
privately owned and span a smaller geographical area (size is restricted to a few kilometres). It can
be used for a variety of purposes, including business buildings, homes, hospitals, and schools.
LANs are simple to set up and manage. Twisted-pair cables and coaxial cables are utilized as a
LAN communication method. Because it only traverses a limited distance, the inaccuracy and noise
are kept to a minimum.

Figure 2 – Local Area Network
(What is Local Area Network? Definition and FAQs | HEAVY.AI, 2022)
1.2 MAN (Metropolitan Area Network)
The Metropolitan Area Network, or MAN, covers a wider area than a LAN and a smaller area than
a WAN. It connects two or more computers that are located in different cities but are connected
through a network. It serves as an ISP and covers a vast geographical area (Internet Service
Provider). Customers who require high-speed connectivity will benefit from MAN. MAN speeds
are measured in megabits per second. A Metropolitan Area Network is difficult to develop and
maintain. The fault tolerance of a MAN is lower, and the network is also more congested. It is
expensive, and it may or may not be held by a single entity. MAN has a moderate data transfer rate
and propagation delay. Modem and Wire/Cable are the devices that are utilized to transmit data
through MAN. A MAN is a component of a telephone company's network that can offer a highspeed DSL connection to a client or a city's cable TV network.


5


Figure 3 - Metropolitan Area Network
(Bagci, 2022)
1.3 WAN (Wide Area Network)
A Wide Area Network, or WAN, is a computer network that spans a vast geographic area, however
it may be limited to the boundaries of a state or country. A WAN is a network of local area networks
(LANs) that link to other LANs via telephone lines and radio waves. It can be restricted to a single
firm (a corporation or organization) or open to the public. The technology is both high-speed and
low-cost.

Figure 4 - Wide Area Network
(Networking Service - Wan Networking Service Retailer from Noida, 2022)
2. Protocols and standards
2.1 Network Protocol
A network protocol is a set of rules that govern how data is exchanged between devices connected
to the same network. In essence, it enables connected devices to interact with one another despite
variations in internal operations, structure, or design. Network protocols are responsible for
allowing you to interact with individuals all over the world, and they play an important part in
modern digital communications. They ensure that computer network devices, independent of their
differing designs, hardware, or infrastructures, can transmit and receive data using a common
language. The end-to-end processes of timely, secure, and managed data or network communication
are governed by network protocols. They can be implemented in hardware or software, and they're
so crucial that, in practice, every network relies on them for communication and connectivity.
6


Figure 5 - Network Protocol
(Computer Network Protocol, 2022)


TCP/IP
Transmission Control Protocol/Internet Protocol (TCP/IP) is a set of communication protocols that
are used to connect network devices on the internet. In a private computer network, TCP/IP is also
used as a communications protocol (an intranet or extranet).

Figure 6 – TCP/IP
(TCP/IP Là Gì - Tìm hiểu mơ hình bộ giao thức TCP/IP, 2022)
HTTP
The World Wide Web's cornerstone is the Hypertext Transfer Protocol (HTTP), which is used to
load web pages via hypertext links. HTTP is an application layer protocol that runs on top of other
layers of the network protocol stack to convey data between networked devices. A typical HTTP
flow involves a client sending a request to a server, which then responds with a message.

7


Figure 7 - HTTP
(2022)
DNS
The Domain Name System (DNS) is the Internet's phone book. Domain names such as nytimes.com
and espn.com allow people to access content on the internet. Internet Protocol (IP) addresses are
used to communicate between web browsers. DNS converts domain names to IP addresses,
allowing browsers to access resources on the Internet. Each Internet-connected device has a unique
IP address that other machines use to locate it. DNS servers minimize the need for people to learn
IP addresses like 192.168.1.1 (in IPv4) or more complex modern alphanumeric IP addresses like
2400:cb00:2048:1::c629:d7a2 (in IPv6) (in IPv6).

Figure 8 – DNS
(2022)

DHCP
The Dynamic Host Configuration Protocol (DHCP) is a network management protocol that
automates the process of setting devices on IP networks so that they can access network services
like DNS, NTP, and any UDP or TCP-based communication protocol. A DHCP server assigns each
device on a network a dynamic IP address and other network setup parameters so that they can
communicate with other IP networks. DHCP is an improved version of an older protocol known as
BOOTP. The DHCP protocol is a crucial component of the DDI solution (DNS-DHCP-IPAM).

8


Figure 9 – DHCP
(2022)
ICMP
The Internet Control Message Protocol (ICMP) is a network layer protocol that network devices
used to identify communication problems in networks. The ICMP protocol is primarily used to the
protocol is commonly used on network devices like routers. ICMP is essential for error reporting
and testing, but it can also be utilized in DDoS attacks.

Figure 10 - ICMP
(2022)
2.2 International standard
Customers of computer and networking goods, as well as the manufacturers who sell to them, have
benefited greatly from the growth of open standards that are not owned by any one business.
However, organizations that will coordinate the creation and publication of these papers are
required to assist in the development of open standards. Generally speaking, they are non-profit
organizations that take a neutral stance on technologies and aim to improve the industry as a whole.
Names of the standard used in networking:
- International Organization for Standardization (ISO)
- American National Standards Institute (ANSI)

- Information Technology Industry Council (ITIC)
- National Committee for Information Technology (NCITS)
- Institute of Electrical and Electronics Engineers (IEEE)
- Electronic Industries Alliance (EIA)
- Telecommunications Industry Association (TIA)
- International Telecommunication Union - Telecommunication Standardization Sector (ITU-T)
9


European Telecommunications Standards Institute (ETSI)
3. OSI Model
The International Organization for Standardization (ISO) developed the open systems
interconnection (OSI) model, which allows different communication systems to communicate via
standard protocols. In layman's terms, the OSI establishes a standard for computer systems to
communicate with one another. The OSI Model can be thought of as a universal computer
networking language. It's based on the idea of breaking down a communication system into seven
abstract layers that are piled on top of each other.

Figure 11 - OSI Model
(2022)
P2. Explain the impact of network topology, communication and bandwidth requirements.
1. Network topology
The topology of your network refers to how nodes, devices, and connections are physically or
logically connected to one another. Consider your network to be a city, with the topology serving as
the road map. There are numerous methods to arrange and manage a network, just as there are
different ways to arrange and maintain a city — for example, ensuring that avenues and boulevards
can enable movement between the busiest parts of town. Each has benefits and drawbacks, and
depending on your company's needs, different arrangements can provide you with a higher level of
connectivity and security. Physical and logical topologies are the two methods of network topology.
The actual links and interconnections between nodes and the network—the wires, cables, and so on

—are referred to as physical network topology. Logical network topology is more abstract and
strategic, referring to the conceptual knowledge of how and why the network is set up the way it is,
as well as how data flows across it.

10


Figure 12 - Network Topology
(Ghahrai, 2022)
2. Physical topology
The interconnected structure of a local area network is referred to as physical topology (LAN). The
physical topology is defined by the method used to link the physical devices on the network to the
cables, as well as the type of cabling utilized. Logic topology, on the other hand, specifies a
network's media signal performance and how it trades device data.

Figure 13 - Physical Topology
(Internet of everything, 2022)
3. Logical topology
A logical topology is a networking concept that describes the architecture of a network's
communication mechanism for all nodes. The logical topology of a network can be dynamically
maintained and modified using network equipment such as routers and switches. Physical
topologies refer to the physical linkages of all devices in the network, whereas logical topologies
refer to the logical interconnections of all devices in the network.

11


Figure 14 – Logical Topology
(2022)
4. Difference between Physical topology and Logical topology

The physical layout of the network medium is referred to as physical topology. Logical topology, on
the other hand, refers to the manner in which data is transported throughout a network.
In a logical topology, the physical topology would not prevent data from being transmitted from one
device to another.
Physical topology can be altered, however logical topology is intangible.
Comparison Table

Figure 15 - Comparison Table
(Difference Between Star and Ring Topology (with Comparison Chart) - Circuit Globe, 2022)
Conclusion
Network topology is an important aspect of networking since it serves as the foundation for laying
out a network efficiently. When it comes to planning and deploying a network, both physical and
logical topologies are equally important. If not carefully planned, physical topology can influence
cost and scalability aspects, whilst logical topology can have a detrimental impact on data traveling
in the form of packets.
5. Other topologies
5.1 Mesh
All nodes or devices in a mesh architecture are directly or partially connected to one another. A
point-to-point link is made through mesh topology. Mesh topology used to be half-duplex, which
meant data was either received or sent at the same time. However, mesh topologies now offer full12


duplex transmission, which means data is sent and received at the same time. Mesh topologies can
be wired or wireless, and they can be used in both LAN and WAN environments.

Figure 16 - Mesh
(2022)
Advantages:
- It has a lot of strength.
- The problem is easily identified. Data is secure because it is transmitted across specific channels

or linkages between devices.
- Provides privacy and secure.
Disadvantages:
- It's difficult to set up and configure.
- Because bulk wiring is necessary, cable costs are significant, making them ideal for a smaller
number of devices.
- The cost of upkeep is prohibitively high.
5.2 Star
All of the devices in a star topology are connected to a single hub via a wire. This hub serves as the
core node, with all other nodes connecting to it. The hub might be passive in nature, meaning it is
not an intelligent hub like broadcasting devices, or it can be active, meaning it is intelligent.
Repeaters are found in active hubs.

13


Figure 17 – Star
(Difference Between Star and Ring Topology (with Comparison Chart) - Circuit Globe, 2022)
Advantages
When N devices are connected in a star topology, the total number of cables needed to connect them
is N. As a result, it is simple to set up.
Because each device only needs one port to connect to the hub, the total number of ports required is
N.
Disadvantages
The entire system will come crashing down if the concentrator (hub) on which the entire topology is
based fails.
The installation costs a lot of money.
The performance is dependent on a single concentrator, referred to as the hub.
5.1 Bus
Every computer and network device is connected to a single cable in a bus topology network. It

sends data in a single direction from one end to the other. In bus topology, there are no bidirectional features. It is a multi-point connection with a non-robust topology since the topology
crashes if the backbone breaks.

Figure 18 – Bus
(2022)
14


Advantages
In a bus topology, if N devices are connected to each other, the number of cables required to
connect them is 1, known as a backbone cable, and N drop lines are required.
The cable is less expensive than other topologies, however it is only used to create tiny networks.
If the common cable breaks, the entire system will fail.
When network traffic is high, network collisions become more common. To avoid this, the MAC
layer employs protocols such as Pure Aloha, Slotted Aloha, CSMA/CD, and others
The level of security is quite low.
5.2 Ring
It establishes a ring connecting devices with its exactly two nearby devices in this topology. When a
ring topology with a large number of nodes is employed, a number of repeaters are necessary
because if someone wishes to send data to the last node in a ring topology with 100 nodes, the data
must pass through 99 nodes before reaching the 100th node. As a result, repeaters are utilized in the
network to prevent data loss.

Figure 19 – Ring
(Difference between star and ring topology - javatpoint, 2022)
Advantages
In this type of structure, the chances of colliding are extremely slim.
Installing and expanding the system is inexpensive.
Disadvantages
In this topology, troubleshooting is challenging.

The addition of stations between them or the removal of stations can cause the entire topology to be
disrupted.
It's less safe.
5.3 Network communication
A communication network is a pattern or form used in an organization to effectively exchange
information. The communication network is a well-established system that allows messages to
travel in one or multiple routes within an organization depending on requirements. Formal and
15


informal communication are the two main styles of communication. Different communication
networks can be developed based on their effectiveness depending on the nature and size of the
company as well as the forms of communication. The development of an effective communication
network in large enterprises is difficult. The main communication network in such organizations is
separated into multiple subnetworks that maintain ties with the main network in order to be
effective. The communication network is useful in determining the speed, accuracy, and smoothness
with which messages flow throughout the company.
Rules in network communication
An identified sender and receiver
Common language and grammar
Speed and timing of delivery
Confirmation or acknowledge requirements
5.4 Bandwidth
The maximum capacity of a wired or wireless communications link to send data via a network
connection in a given length of time is known as network bandwidth. The number of bits, kilobits,
megabits, or gigabits that can be transmitted in one second is commonly used to describe
bandwidth. Bandwidth is a term used interchangeably with the capacity to indicate the rate at which
data is transferred. A popular misperception is that bandwidth is a measure of network speed.
Why Bandwidth is important
The amount of bandwidth available is limited. There is only so much capacity available at any

particular deployment area, such as a home or company. This is sometimes due to the network
device's physical restrictions, such as the router or modem, cabling, or the wireless frequencies
being used. Other times, a network administrator or an internet or wide area network (WAN) carrier
will limit bandwidth on purpose. When multiple devices are connected to the same network,
bandwidth must be shared. Some devices, such as 4K TVs, consume a lot of bandwidth. A webinar,
on the other hand, often consumes significantly less bandwidth. While speed and bandwidth are not
synonymous, more bandwidth is required to maintain acceptable rates across numerous devices.
Here's an example of average bandwidth consumption for several services.

Figure 20 - Bandwidth
(What is network bandwidth and how is it measured?, 2022)
P3. Discuss the operating principles of networking devices and server types
16


1.
Networking Device:
1.1 Switches
A switch is a multi-port bridge with a buffer and a design that can improve its efficiency and
performance (having a large number of ports means less traffic). A data link layer device is a switch.
The switch can check for problems before forwarding data, which makes it incredibly efficient
because it doesn't transfer packets with mistakes and only forwards good packets to the correct port.
To put it another way, the switch separates the collision domain of hosts while keeping the
broadcast domain the same.

Figure 21 – Switch
(Ellis, 2022)
1.2 Routers
A router, similar to a switch, is a device that directs data packets according to their IP addresses.
The router is primarily a device that operates at the Network Layer. Routers connect LANs and

WANs and use a dynamically updating routing table to decide how to route data packets. The
broadcast domains of hosts linked through it are divided by the router.

Figure 22 – Router
(Design, 2022)
2. Other common networking devices
17


2.1
Gateway
A router, similar to a switch, is a device that directs data packets according to their IP addresses.
The router is primarily a device that operates at the Network Layer. Routers connect LANs and
WANs and use a dynamically updating routing table to decide how to route data packets. The
broadcast domains of hosts linked through it are divided by the router. It's possible that it's linked to
the router because a router carefully considers the routing path of data packets arriving at the
gateway, and then a switch selects an appropriate in and out a route for the assigned packet. Despite
the fact that numerous devices can operate as a gateway, the gateway is an essential property of
courses.

Figure 23 – Gateway
(Gateway là gì? Khái niệm về Gateway tự xây dựng? Dựng sẵn?, 2022)
2.2 Firewall
A firewall is a network security device that analyzes in the coming and outgoing network traffic and
determines whether specific traffic should be allowed or blocked based on a set of security rules.
For more than 25 years, firewalls have served as the first line of defense in network security. They
create a barrier between secure, controlled internal networks that can be trusted and untrustworthy
external networks like the Internet. A firewall might be hardware, software, or a combination of the
two.


18


Figure 24 – Firewall
(2022)
3. Types of servers
3.1 DHCP server
A DHCP Server is a network server that assigns IP addresses, default gateways, and other network
information to client devices on a regular basis. To reply to broadcast inquiries from clients, it uses
the Dynamic Host Configuration Protocol, or DHCP, as a common protocol. A DHCP server
transmits the appropriate network parameters to clients so that they can communicate correctly on
the network. Without it, the network administrator must manually configure each client who joins
the network, which can be time-consuming, particularly in big networks. Each client is normally
assigned a unique dynamic IP address via DHCP servers, which changes when the client's lease for
that IP address expires.
Example:

Figure 25 – DHCP Server
(DHCP server là gì? DHCP server hoạt động như thế nào? - BKNS.VN, 2022)
3.2 DNS server

19


The Domain Name System (DNS) is the Internet's phone book. DNS is responsible for determining
the right IP address for domain names such as 'google.com' or 'nytimes.com' when users type them
into web browsers. The addresses are then used by browsers to communicate with origin servers or
CDN edge servers in order to retrieve website data. DNS servers, which are workstations
specialized to responding DNS queries, are responsible for all of this.
Example:


Figure 26 – DNS Server
(2022)
P4. Discuss the inter-dependence of workstation hardware with relevant networking software.
1. Interdependence definition
Each description of interacting networks will respond to this question differently, but any attempt to
explain a network of networks will be based on the premise that more is different—that by breaking
the overall system down into component networks, new phenomena might be discovered and
anticipated. Interdependence is one way of characterizing the interaction of networks that results in
qualitatively new occurrences.
Example:

20


Figure 27 – Interdependence definition
(2022)
1.2 Workstation hardware
Computer hardware refers to all of the physical components of a computer, whether it's analog or
digital. Hardware refers to the physical components of a computer as opposed to software, which is
made up of written, machine-readable instructions or programs that tell physical components what
to do and when to do it. Computer hardware is divided into two types: internal and exterior
components. Internal hardware components are those that are required for the computer's proper
operation, whereas external hardware components are those that are attached to the computer to add
or expand functionality.
Example:

Figure 28 – Workstation hardware
(Fundamentals, 2022)
1.3 Networking software

A set of instructions, data, or programs used to control computers and perform certain activities is
known as software. It is the polar opposite of hardware, which refers to a computer's physical
components. Applications, scripts, and programs that run on a device are collectively referred to as
software. It's the movable component of a computer, whereas the unmovable part is the hardware.
Application software and system software are the two main forms of software. An application is a
21


piece of software that serves a certain purpose or completes a task. System software is created to
run the hardware of a computer and to offer a platform for programs to run on top of.
Example:

Figure 29 – Networking software
(Software, 2022)
1.4 Interdependent between software and hardware
Computer software, in essence, is in charge of controlling computer hardware. These two
components are mutually exclusive and cannot function without one another. A computer's
hardware and software must work together to properly modify data and produce usable output.
Computer hardware is meaningless without software. Computer software, on the other hand, cannot
be used without supporting hardware. Similarly, computer software must first be loaded into the
hardware of the computer before being run. There are various types of software, with the two most
common being operating systems and application software.
Example:
An iPod is used to play MP3 music that has been recorded. You'll need three things to listen to the
recorded music: an iPod, a speaker, and an MP3 file. Both the iPod and the speaker are instances of
hardware in this scenario. In this scenario, the MP3 file would represent software. You wouldn't be
able to listen to the MP3 without the iPod or the speaker. Similarly, the iPod and speaker would be
useless if they couldn't play MP3 files.

22



Figure 30 - Interdependent between software and hardware
(2022)
1.5 Where is the link layer Implemented
Most of the time, the network adapter, sometimes referred to as the Network Interface Card,
implements the link layer (NIC).
The link layer controller, which is often a single, dedicated chip that provides numerous link-layer
services, is what powers a network. As a result, the hardware is used to implement the majority of
the link layer controller's features.
For instance, the Atheros AR5006 controller supports the 802.11 Wi-Fi protocols, while Intel's
8254x controller implements the Ethernet protocols.
Up until the late 1990s, the majority of network adapters were physical separate cards (like
PCMCIA cards or plug-in cards that occupied PCI card slots), but now network adapters are
progressively being incorporated onto the host's motherboard, a setup known as LAN-onmotherboard.

Figure 31 - Where is the link layer Implemented

1.6 Interfaces communicating
23


In
communication studies, the notion of an interface in the work environment is used for a point of
interaction between a number of systems or work groups. In the manufacturing environment, the
coordination and interaction between several work groups are used to communicate plans and
control production activity. This interaction can be schedules, human interactions, computer
systems, or any other medium of communication. A physical interface is an interconnection
between two items of hardware or machinery.


Figure 32 – Interfaces communicating

24


References
Available at: [Accessed 5th August
2022].
Available at: [Accessed
5th August 2022].
Available at: [Accessed 5th
August 2022].
Available at: [Accessed 5th
August 2022].
Available at: [Accessed 6th August 2022].
Available at: [Accessed 6th
August 2022].
Available at:
/>Networks [Accessed 6th August 2022].
Available at: [Accessed 6th August 2022].
Available at: [Accessed
6th August 2022].
Available at: [Accessed
6th August 2022].
Norman-network.net. 2022. WELCOME TO THE NORMAN NETWORK | NORMAN.
[online] Available at: < [Accessed 15 August 2022].
Heavy.ai. 2022. What is Local Area Network? Definition and FAQs | HEAVY.AI. [online]
Available at: < [Accessed 15
August 2022].
Bagci, T., 2022. What is a MAN (Metropolitan Area Network)? - SYSNETTECH Solutions.

[online] SYSNETTECH Solutions. Available at:
< [Accessed 15 August 2022].
IndiaMART.com. 2022. Networking Service - Wan Networking Service Retailer from Noida.
[online] Available at: < [Accessed 15 August 2022].
Medium. 2022. Computer Network Protocol. [online] Available at:
< />[Accessed 15 August 2022].
Vietnix. 2022. TCP/IP Là Gì - Tìm hiểu mơ hình bộ giao thức TCP/IP. [online] Available at:
< [Accessed 15 August 2022].
2022. [online] Available at: <a/p/http-hypertext-transfer-protocol6BkGyK9xR5aV> [Accessed 15 August 2022].
2022. [online] Available at: < [Accessed 15 August 2022].
2022. [online] Available at: < [Accessed 15 August 2022].
25


Tài liệu bạn tìm kiếm đã sẵn sàng tải về

Tải bản đầy đủ ngay
×