Unit 2 - Assignment BDT
Unit 2 - Assignment BDT
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P1 P2 P3 P4 P5 P6 P7 P8 M1 M2 M3 M4 D1 D2 D3
ASSIGNMENT BRIEF SHEET
Academic Year
Unit Tutor
IV name and date Khoa Canh Nguyen, Nhung, Michael Omar 9th/01/2020
Submission format
Part 1
The submission is in the form of an individual written report. This should be written in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as
appropriate, and all work must be supported with research and referenced using the Harvard referencing system.
Please also provide a bibliography using the Harvard referencing system. The recommended word limit is 2,000–
2,500 words, although you will not be penalized for exceeding the total word limit.
Part 2
The submission is in the form of an individual evidence portfolio.
You are required to make use of headings, paragraphs, subsections and illustrations as appropriate, and all work
must be supported with research and referenced using the Harvard referencing system.
Assignment Brief
You are employed as a Network Engineer by Nguyen Networking Limited, a high-tech networking solution
development company, which have branches in Ho Chi Min City, Hanoi, Da Nang and Can Tho.
The company has been contracted to implement a networking project from a local educational institute. The
specification of the project is given below:
People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher managers including the
head of academics and the programme manager, 3 computer network administrators.
Part 1
You will need to produce a report that includes the following:
The CEO Mr. Nguyen is happy with your first report and now he has asked you to analyze the specification
from the institution, as given earlier.
You need to design and implement the networking project within a given timeframe:
ASSESMENT CRITERIA
P1 Discuss the benefits and constraints of different network types and standards.
Computer networking is an engineering discipline aimed at studying and analyzing the process of communication between different co
mputer devices or computer systems that are connected or networked together to exchange data and share resources.
Advantages:
Increased speed
Reduced cost
Improved safety
Central software management
Flexible access to electronic mail
Disadvantages:
High installation costs
It takes time to manage
the faults of the server or cable
History of network:
1960s: Leonard Kleinrock proposed the idea of one of the earliest computer networks, ARPANET, and the development of
ARPANET began in 1966. The Internet was formally born in 1969. It linked four pcs (UCLA, Stanford Research Institute, UCSB, and
Utah University) from four universities. 1970s: Ray Tomlinson sent the first e-mail in 1971. The Wi-Fi basis, a wireless UHF packet
network called ALOHAnet, was used in the same year. Robert Metcalfe and David Boggs created the Ethernet prototype in 1973,
which operated at 2.94 Mbps. In 1978, Bob Kahn created and created the TCP / IP network protocol with the assistance of Vint Cerf.
1980s: In 1981, RFC 791 formally specified IPv4, the first significant version of the Internet protocol. BITNET was created and in the
same year CSNET was established. In 1983, ARPANET banned NCT and needed TCP / IP. The idea of VLAN was created in the
early 1980s and WaveLAN network technology was launched, the official forerunner of Wi-Fi. 1990: Tim Berners-Lee et al.
consolidated the WWW in 1992 with two primary parts: HTTP and HTML. IPv6 has been upgraded to a broad spectrum of IP
addresses from IPv4, enhanced routing, and encryption integrated. The first version of the 802.11 Wi-Fi standard was launched in
1997. In turn, the 802.11a and 802.11b were developed two years later, providing transmission speeds of up to 11 Mbps. 2000s: All
Wi-Fi devices must be WPA2 certified by 2006 (an upgrade and replacement of WPA). In 2009, the 802.11n Wi-Fi standard became
official, providing higher transfer speeds and being able to operate on the 2.4GHz and 5GHz bandwidths. 2018: The Wi-Fi Alliance
introduced WPA3 encryption for Wi-Fi.
In 21st century, technology plays a crucial role in a new era of innovation. In particular, industry 4.0 allows electronic devices, even a
machine system to operate automatically with wireless connectivity and sensors. While the fourth industrial revolution aims at
automating and sharing data between devices as well as systems and manufacturing processes, the network is a tool for people to
connect and share information easily. Today, almost every field, the same as businesses, organizations, or media, uses the network.
Computer network can be said to be an important factor in life. We can not deny the benefits of computer networking, but we should
also take its disadvantage into account.
Benefits:
Occupational opportunities There are many popular IT jobs with high prospects such as programming mobile apps, database
administrator, software engineer, etc. And for its easy accessibility to people, the network not only assists in the IT area but also helps
someone else. It means which people who are looking for work can easily search for the job they want. Share information easily The
most useful tools of computer networks are sharing files, sharing resources, sharing a single connection or increasing storage capacity.
It helps save time and energy for people. In contrast, instant message is not a problem for the people now, they can talk to each other
in real time or even work or organize online meetings over a connected line. Accessibility to people Accessing technology devices is
no longer difficult for people, which means that everyone can easily access the network on their own. Even easier than ever, because
the way they use the network is just a search or social networking as well. For example, Google's well-known search engine is being
developed to bring people access to the internet. Many people recognize the engine and its daily use shows that the network plays an
enormous role in the daily lives of people, and without it we can't think about how our lives will be. Cost Installation of the network is
becoming easier and cheaper. It can also last a long time and does not involve frequent installation or modifications of the scheme. It
also enables us to download on - the-market software applications. Last but not least, most of the data it offers is free and there are
different resources for us to consult. A numerous amount of knowledge The willingness of people to share data and lessons is
increasing. This implies finding the data we need is much easier for us. It can be seen that for traditional data searching is reading
books and by looking online, by typing and clicking, most individuals will select the quicker type.
Constraints:
Security: Many people use the Internet, we can not be certain that the information that we have been looking for is safe or not.
Because people share a lot of files and resources, sometimes we get confused about what is really right or wrong. Even a hacker or
theft can steal our privacy information. Lack of independence: Because customers often have to rely uncontrolled on a server, sudden
server failure that prohibits users from continuing to work is also a damaging factor for network users.
Addiction: These days, people tend to work and have fun on smart devices. Most of their job is done by e-mail, homework online,
etc. They check up to 100 times a day on their phones, or even check job messages on holiday. The more time we spend on data
access, the less time we have to relax.
Information availability: The data published is not controlled and the quantity of it is endless. We can not understand if the data we
obtained is true or false, nor can we be sure of the origin of the data.
Computing network policy: Although we have a secure network policy (NSP), we still have no clue what we are really going to face
during the network usage phase. Cybersecurity regulations are also unable to reach individual network users, and data thieves can still
benefit from network infringements. To conclude, networking is now the best way to interact and share data with each other. Like
other things, however, network itself has benefits and disadvantages, so we need to increase consciousness about how we use it and
think about the implications before we do anything on the internet.
B. Network types:
• PAN (Personal Area Network): a computer network for connecting among devices such as smartphones, laptop, tablet centered on
an individual person’s workspace. It is managed by one person or organization. This sort is effective, comfortable, and comparatively
safe. It gives users low information rates, however, and does not suit bigger distances for wireless connection.
• LAN (Local Area Network): a computer network connects groups of computers within a limited area such as house, school, or
office building, which is owned, controlled, and managed by a single person or organization. LAN communication is simple, quick
and time-saving. Furthermore, all LAN computers are recognized. The range of this sort, on the other hand, is restricted and the set-up
fee is costly.
• MAN (Metropolitan Area Network): a combination of LAN and WAN. MAN span the entire area such as town or city. It is owned
and operated by a government body or large corporation. MAN offers users with high velocity experience, but it's also cheaper. But
it's hard to handle and there are more opportunities to attack hackers, so information can be leaked.
• WAN (Wide Area Network): a telecommunications network that expands on a huge geographical area, which exist under collective
or distributed ownership or management. This sort of network includes a bigger region of geography. You can distribute your job
elsewhere and decrease travel fees as well. WAN, on the contrary, concludes mixed technologies that generate a safety gap. The
installation costs are also high.
• WLAN (A Wireless LAN): using wireless communication to form LAN within a specific area such as home, school, etc. It allows
users to move around within the area without depending on physical cables to connect to the network. With big information rat, it has
inexpensive costs. Users can migrate the workstation while the connectivity is maintained. However, the region it includes needs
permission. In addition, the data transfer rate will reduce if the amount of linked devices rises.
• SAN (Storage Area Network or System Area Network): used to promote accessibility of storage devices and to explain a
relatively local network that is designed to provide high-speed connection. High information transfer speed and data security are two
of this sort of network's many benefits. Like others, it also has drawbacks such as not being great for heavy traffic and leaking delicate
information ca.
• VPN (Virtual Private Network): allowing users to send and receive data through private network and can access a private network
remotely. VPN protects your sensitive information, including bank account information, credit card information, or email credentials.
By using VPN, you can play any game without being banned. Nevertheless, VPN is sometimes expensive due to high-quality service,
and not all devices support VPN because some operating systems and devices do not have VPN software.
• Internet: the global system that connects all devices worldwide by using the Internet protocol suite (TCP/IP). It is a network of
networks contains private, public, academic, business and government networks. People can interact worldwide and in real time with
each other and save more time than ever before. Despite this, private privacy has reduced and the way individuals are dependent on it
can decrease productivity.References:
• Client/Server
The server computer is an available resource and provides a service or function when asked. The client computer requests for the
service and has to use an operating system that allows it to be identified to join the network. The server computer is classified by the
services they provide such as file, print, application, massage, and database.
Advantages:
- Security
Disadvantages:
- Expensive server
- Professional manager
• Peer to Peer (P2P)Each computer plays role as both client and server. Each one is responsible for creating resources as
well as asking for networking resources. P2P relationship is suitable for a small network including less
Advantages:
Disadvantages:
• Cloud
Cloud network exists within or is component of a cloud computing infrastructure that offers network interconnectivity between cloud-
based applications, services and solutions that are allowed. Many cloud kinds exist: government, private, hybrid, and community
cloud.
• Cluster A computer cluster can be seen as a single system with a set of computers that are loosely or tightly connected and work
together in many aspects. Each node performs the same job in this network scheme and is regulated by software.
Disadvantages: all subsystems fail if the key system is damaged and is not accessible.
• Virtualization
Virtualization uses software to simulate a hardware platform such as a server, storage device or
network resource.
Advantages: Reduce operating cost. Increase IT productivity, efficiency, agility, and responsiveness.
Simpler to manage.
Disadvantages: the cost is vast and increase when organization expands. Public network security
C. Networking standards
To show its structural design, a networking model organizes tasks and characteristics of a scheme.
It offers a starting point for determining what needs to be done to allow communication or for figuring
The Open Systems Interconnection (OSI) model is a conceptual model developed by the International Organization for
Standardization that allows the use of normal protocols to interact with various communication systems. In simple English, the OSI
offers a standard for communication between distinct computer systems.
The OSI model can be viewed as a universal computer networking language. It is based on the idea of dividing a communication
scheme into seven abstract layers, each stacked on the last layer.
( Source: www.cdn.ttgtmedia.com )
The OSI model's seven abstraction layers can be described from top to bottom as follows:
This is the only layer that interacts directly with the user's information. To initiate communications, software applications such as web
browsers and email clients depend on the application layer. However, it should be made clear that client software apps are not
component of the application layer; instead, the application layer is accountable for the protocols and information manipulation on
which the software depends in presenting significant information to the customer. Application layer protocols include both HTTP and
SMTP (one of the protocols that allows email communication is the Simple Mail Transfer Protocol).
This layer is mainly accountable for information preparation so that the application layer can use it; in other words, layer 6 makes the
information available for consumption apps. Data translation, encryption and compression is the responsibility of the presentation
layer.
Two communicating systems may use distinct encoding techniques, so it is up to layer 6 to translate incoming data into a syntax that
the receiving device's application layer can comprehend.
If the devices communicate over an encrypted connection, it is the responsibility of layer 6 to add the encryption at the end of the
sender as well as to decode the encryption at the end of the receiver.
Layer 4 is responsible for both devices ' end-to-end interaction. This involves taking and breaking information from the session layer
into pieces called segments before sending it to layer 3. It is the responsibility of the transport layer on the receiving device to
reassemble the segments into data that the session layer can consume.
Also accountable for flow control and error is the transport layer
3.The network layer
It is the responsibility of the network layer to facilitate information transfer between two separate networks. If the two communicating
devices are on the same network, then there is no need for the network layer. The network layer breaks down sections on the sender's
device from the transport layer into smaller units, called packets, and reassembles those packets on the receiving machine. The
network layer also finds the data's best physical path to reach their destination; this is called routing.
The data link layer is very comparable to the network layer, except that the data link layer facilitates information transfer on the
SAME network between two machines. The layer of the data link takes packets from the layer of the network and breaks them into
narrower frames. Like the network layer, the data link layer is also responsible for intra-network communication flow control and
error control (only flow control and error control for inter-network communication is carried out by the transport layer).
Advantages:
It is a model that is truly generic. And in computer networking it is regarded a standard model
Services, interfaces, and protocols distinguish layers in OSI model architectures
Adapting to many protocols has all the flexibility
It promotes connectivity and connectivity-oriented services
For this OSI model architecture, administration and maintenance are simple and simple.
This layered architecture is based on the principle of abstraction
It is safer and more adaptable than bundling all facilities in one layer
Disadvantages:
It defines no specific protocol.
In this model, it can sometimes be hard to fit a fresh protocol
There is a certain duplication of services in different layers
Interdependence also exists between the layers
o TCP/IP model
Transmission Control Protocol / Internet Protocol (TCP / IP) is the language used by a computer for internet access. It consists of a sui
te of protocols designed to set up networks to provide internet access to a host.
TCP / IP is accountable for full information connectivity and end-to-end data transmission by offering additional features including
addressing, mapping and acknowledgement. TCP / IP has four layers that are slightly different from the OSI model.
The technology is so prevalent that the complete name would rarely be used. In other words, the acronym is now the word itself in
popular use.
1.The Network Layer
This layer is the mixture of the OSI model's Data Link Layer and Physical Layer. It looks for hardware addressing and the protocols in
this layer allow information to be transmitted physically.
We've just talked about ARP being an Internet layer protocol, but there's a conflict over declaring it as an Internet Layer or Network
Access layer protocol. It is defined as residing in layer 3, encapsulated by the protocols of layer 2.
2.Internet layer
This layer parallels the network layer tasks of OSI. It describes the protocols that are accountable for the network-wide logical
transmission of information. The primary protocols that reside on this layer are:
IP–stands for Internet Protocol and is accountable for providing packets to the target host from the source host by looking at the IP
addresses in the packet headers. There are two variants of the IP: IPv4 and IPv6. IPv4 is the one presently used by most websites. But
IPv6 is increasing as opposed to the amount of consumers, the amount of IPv4 addresses is restricted in number.
ICMP is the Internet Message Control Protocol. It is encapsulated in IP datagrams and is accountable for offering data on network iss
ues to hosts.
ARP stands for Protocol on Address Resolution. His task is to discover a host's hardware address from a recognized IP address. There
are several kinds of ARP: Reverse ARP, Proxy ARP, Free ARP and Inverse ARP.
3. Transport Layer
This layer is similar to the OSI model's transport layer. It is accountable for end-to
end communication and information distribution without errors. It shields apps in the upper layer from information complexities. In th
is layer, the two primary protocols are:
Transmission Control Protocol (TCP)–Reliable and error-free communication between end devices is known to be provided. It
carries out data sequencing and segmentation. It also has recognition function and controls information flow through the mechanism
of flow control. It is a very efficient protocol but owing to such characteristics it has a lot of overhead. Higher overhead leads to higher
costs.
User Datagram Protocol (UDP) However, no such characteristics are available. If your request does not require reliable transportatio
n because it is very cost-effective, it is the go - to protocol. UDP is connectionless unlike TCP, which is a connection-oriented protoco
l.
4.Application Layer
This layer executes the tasks of the OSI model's top three layers: Application, Presentation and Session Layer. It is accountable for
communication between node and node and it regulates the requirements of the user interface. Some of the protocols in this layer are:
HTTP, HTTPS, FTP, TFTP, Telnet, SSH, SMTP, SNMP, NTP, DNS, DHCP, NFS, X Window, LPD. For some data about these
protocols, look at the protocols in the Application Layer. Protocols other than those in the related article are as follows:
HTTP and HTTPS–HTTP is the protocol for the transfer of hypertext. The World Wide Web uses it to handle web browser and
server communications. HTTPS is HTTP-Secure. It's a SSL (Secure Socket Layer) mixture of HTTP. In instances where the browser
needs to complete forms, log in, authenticate, and perform bank transactions, it is effective.
SSH –Secure Shell stands for SSH. It's a Telnet: Like terminal
emulation software. The most preferred reason for SSH is its capacity to preserve the encrypted connection. It uses a TCP / IP link to s
et up a safe session.
NTP – NTP is the protocol of Network Time. The clocks on our desktop are synchronized to one standard time source.
Advantages:
Disadvantages:
In essence, it's not generic. So, no protocol stack other than the TCP / IP suite can be represented. It can't define the Bluetooth l
ink, for instance.
The ideas of services, interfaces, and protocols are not obviously separated. Therefore, describing new techniques in new netw
orks is not appropriate.
It does not differentiate between the data connection and the physical layers, which have very distinct functionalities.
It was initially intended for wide area networks and implemented. Small networks such as LAN (local area network) and PAN
(personal area network) are not optimized.
Established to provide LAN, MAN, and WAN with architecture, management, safety, and internetworking. It includes four groups
that focus on distinct norms and policies in the following fields: Internet work, Audio / Video (A / V) bridging, Data Center bridging,
Security.
This is set to define the physical and networking features of the Ethernet network. For instance, how physical node links (routers /
switches / hubs) are performed by different wired media such as coaxial copper or fiber cable.
This is set to define the physical and networking features of the Ethernet network. For instance, how physical node links (routers /
switches / hubs) are performed by different wired media such as coaxial copper or fiber cable.
Applying to WLAN and providing 1 or 2 Mbps transmission in the 2.4 Ghz band using either FHSS or DSSS.
P2: Explain the impact of network topology, communication and bandwidth requirements
A. Network topology
A1. What is "network topology"
Network technology describes the arrangement and representation of nodes and links in the network as a graph. It includes both
physical and logical design. A logical topology is a depiction in which the devices that use it appear to the network. Physical topology
is physical connections between computer wires and other devices on the network.
Bus:
Bus topology is a kind of network in which each computer and network device is connected to a single cable.
Advantages: keep the layout simple, less cable, low cost, etc.
Star:
In this type of topology, all computers are connected to a single hub through a cable. This hub is the primary
node and all other nodes are connected to the primary node.
Advantages: more reliable, simple set up and manage, no disruption to the network, etc.
Disadvantages: more cables required, central node dependency, high cost, etc. To handle large flows of network traffic among devices
connected, this type is a good option.
Ring:
Ring topology is called because it forms a ring as each computer is connected to a different computer, with
the last connected to the first one. Exactly two neighbors for each device.
Disadvantages: expensive, difficult to find faults, failure of one computer can affect the whole network, etc.
In order to boost the security of the network topology, ring topology is a potential choice.
Mesh:
Mesh networking is a type of network topology in which a machine (node) transmits its own data to other
nodes and acts as a relay. Routers are used to provide the largest and most efficient path of data for
effective communication. In the event of a hardware failure to continue the network communication process,
many routes are available.Advantages: easy fault isolation, more privacy, easier diagnose network problems, etc.
Disadvantages: high cabling required, complex implementation, require an immense amount of configuration,
etc.
B. Network communication
Communication channels are either formal or casual networks (networks through which information flows).
Formal networks follow the energy chain and are limited to task-related communications. The informal
network (grapevine) is free to move in any direction, skipping energy levels and meeting the social needs of
A protocol is a set of legislation that govern communication between computers on a network. Two devices
must talk the same language in order to talk to each other. It needs many different types of network protocols
and standards to ensure that your computer (regardless of which operating system, network card or
application you are using) can communicate on the next desk or halfway around the globe with another
computer. The OSI (Open Systems Interconnection) reference model defines seven layers of networking
protocols. The complexity of these layers extends beyond the scope of this tutorial, but can be simplified into
four layers to help identify the protocols you should be acquainted with.
B3. Types of common communication protocols (For each protocol, you need to discuss about: full
name, working layer, why do we need to use this protocol, how does this protocol work, port number,
The TCP is a standard that defines how to establish and maintain a network conversation via which
- Using a set of rules to exchange messages with other internet points at the information packet level
- Protocol number: 6
The HTTP is the foundation of data communication on the World Wide Web. The hypertext is a structured
text that uses hyperlinks between nodes that contain text. The HTTP is the protocol for the distribution and
- The HTTP is the application protocol for distributed and collaborative hypermedia information system
The FTP is the most popular protocol used to transfer files from the internet and private network.
- The most common protocol used in the file transferring in the Internet and within private networks.
- Port number: 20/21
IP (Internet Protocol)
- The principal protocol in the Internet protocol suite for relaying data across networks
The Domain Name Systems (DNS) is the phonebook of the Internet. People access information online using
domain names such as nytimes.com or r espn.com. Web browsers communicate with e using Internet
Protocol (IP) addresses. DNS translates domain names into IP addresses to allow browsers to load Internet
resources.
- Each device connected to the Internet has a unique IP address which other machines use to find the
device
- Port number: 53
Address Resolution Protocol (ARP) is a process to convert a dynamic IP address in a local area network
(LAN) to a permanent physical device address. The physical machine address is also known as a Media
One of the two main protocols used to get mail from the internet is version 3 of the Post Office Protocol. It's
very simple because it allows the client to get complete information from the server's mailbox and remove
- It allows the client to retrieve complete content from the server mail box and deletes contents from the
server.
C. Bandwidth
Bandwidth is the ability of a wired or wireless network connection to transmit the maximum amount of data
over a computer network or internet connection in a given amount of time— usually a second. Bandwidth,
Bandwidth is the sum of information that moves through a network connection over time as measured in
parts per second (bps). There are countless tools for administrators to evaluate the bandwidth of network
connection. These instruments include on LANs (local area networks) Netperf and TCP testing. There are
countless Internet bandwidth and velocity test programs, most of which are free to use.
Even with these tools at your disposal, it is difficult to correctly evaluate bandwidth usage because it varies
ov er time depending on hardware configuration plus software application characteristics, including how we
are ed.
D. Discuss about the impact of network topology, communication and bandwidth requirements
Network topology impact Plays an significant part in the functioning of the network.
P3- Discuss the operating principles of networking devices and server types.
A. Network devices
NIC
A Network Interface Card (NIC) is a hardware element, typically a circuit board or chip, mounted on a laptop to connect to a network.
Modern NICs provide pcs with features such as I / O interrupt assistance, DMA interfaces, data transmission, network traffic
engineering, and partitioning.
The NIC utilizes the OSI model to send physical layer signals, transmit network layer data packets, and function as a TCP / IP layer in
terface.
The network card of a computer functions by taking the CPU's information and sending it to a location. It transforms the information
into a form that can be cable-transferred and then transforms the information it gets back into computer-usable information. Network
interface cards obtain these data from buses on the motherboard of the computer, typically those that send peripheral information.The
network card converts the data from a parallel structure to a linear structure, allowing it to communicate easily along wires. Once the
target device address is received by the network card, the information will be sent. Information sent back is then transformed back into
parallel structure and redistributed along the buses of the motherboard so that the information obtained can be processed by the CPU.
Types of NIC:
There are two primary kinds of configuration-specific NIC cards: ethernet and wireless. To transfer network information and connect to the
internet, Ethernet NIC cards require you to plug an ethernet cable into the card. This cable's other end is either connected to your modem or to a
router. A tiny antenna connected to the card comes with wireless NIC.The antenna picks up your router’s wireless signal and make it a usable
internet connection for your computer
Configurable network interface cards for older machinery are effective and simple to use. They are equipped with physical jumpers
(tiny devices that control computer hardware without the need for software) that determine interrupt request line settings, input /
output address, upper memory block and transceiver type.
Software configurable network interface cards:
NIC configurable software must be configured manually when installed, but it must contain a proprietary software program that allow
s the operator to configure the NIC through a menu, or choose the auto configuration mode to determine which configuration is most a
ppropriate.
Configurable network interface plug-and-play cards:
Most NICs use PnP technology today as it does not need to be configured manually, though it may be. During the system boot-up seq
uence, PnP NICs will auto-configure during setup, but may cause hard drive disputes.
Network interface cards can be purchased and installed very cheaply.
New network interface cards are capable of reaching speeds up to 2000 Mbps.
Stable device-cable connection.
Proper setup is required so that the device can function properly
It can be unsafe network interface cards and information is not guaranteed.
To manage better speeds, replacement must be substituted.
HUB
A network hub is a node that transmits information to any linked computer or Ethernet device. A hub is less advanced than a switch, o
f which data transmission to particular devices can be isolated.
Working layer in the OSI model
For tiny, easy local area network (LAN) settings, network hubs are best suited. Hubs are unable to provide routing or other sophisticat
ed network facilities. Since they work indiscriminately by transmitting packets across all ports, network hubs are sometimes referred t
o as "dumb switches."
Hubs connect various equipment for computer networking. A hub also functions as a repeater by amplifying signals that deteriorate
over connecting wires after traveling lengthy distances. In the network connecting devices family, a hub is the easiest because it
connects LAN parts with the same protocols.
Types of Hub
Active hub: Repeat the incoming transmissions and reinforce them.Sometimes they are also referred to as repeater
Passive hubs: are merely a connectivity point, with no extra capacities.
Advantages of Hub
It can stretch the network's complete range.
This does not seriously impact network performance.
It's even cheaper.
It can connect various kinds of media.
Disadvantage of Hub
It can not connect distinct network architectures such as token ring and ethernet etc.
ROUTER
A router is a physical or virtual device that transmits information between two or more packet-switched computer networks — analyzi
ng the destination IP address of a specified data packet, calculating the best way to reach that destination and then transmitting it accor
dingly.
• What is a server ?
- A server is a computer program or device that provides a service to another computer program and
its user, also known as the client. Also often referred to as a server in a data center is the physical
device running on a server program. That machine can be a dedicated server, or for other purposes it can also be used.
Types of servers?
- Web server: A Web server is a computer program that offers requesting HTML pages or files. In
- File server: A file server is a computer responsible for the storage and management of the core
information file so that it can be accessed by other machines on the same network.
- Server virtualization: Virtualization of servers is masking server resources from server users, including the number and identity of
individual physical servers, processors, and operating systems.
- Mail Server: A file server is a computer responsible for the storage and management of the core information file so that it can be
accessed by other machines on the same network.
- News Server: News server serves as a source of distribution and delivery for thousands of government newsgroups presently
available through the USENET news network
- Proxy Server: A proxy server is software that works between an endpoint device, such as a laptop, and another server that needs a
customer or client service.
- FTP Server: File Transfer Protocol, one of the oldest Internet services, enables one or more files to be moved securely between
computers while providing security and organization of files
- IRC Server: Internet Relay Chat, an option for those seeking real-time capabilities, consists of several separate server networks (or
"networks") that allow users to connect to each other via an IRC network.
Step 1: Browser Resolves the Domain Name to an IP Address First of all, web browsers need to know the IP address to which the
domain name www.quackit.com resolves. If this information is not already stored in the cache, it will request the information from
one or more DNS servers (through the internet). The DNS server tells the browser which IP address the domain name (and thus where
the website is located) resolves to address.
Now that the web browser knows where the website's IP address is located, the web server can request the full URL.
Step 3: Web Server sends the Requested Page By sending back the requested page, the web server responds. If the page does not exist
(or there is another error), the appropriate error message will be returned.
Step 4: Browser Displays the Webpage This page is sent by your web browser and made available to you.
Server structures:
Mainframe or minicomputer: Mainframe computers are computers primarily used for critical applications by large organizations;
large-scale data processing such as census, industry and consumer statistics, business resource planning, and transaction processing.
They are larger and more powerful in processing than some other computer classes: mini-computers, servers,
Blade server: A blade server is a stripped-down server computer with a modular design optimized to minimize the use of physical
space and energy that has many components removed to save space, minimize power consumption and other considerations while still
Virtual servers: Virtual web servers provide low-cost web hosting services in a very popular way. Dozens of virtual servers can co-
reside on the same computer instead of requiring a separate computer for each server. Performance is not affected in most cases, and
each website acts as if a dedicated server serves it.
Cloud Servers: A cloud server is a logical server built, hosted and delivered over the Internet via a cloud computing platform. Cloud
servers have similar capabilities and functionality to a typical server but are accessed from a cloud service provider remotely.
Dedicated Servers: It refers to the rental and exclusive use of a computer which includes a Web server, related software, and Internet
connection, housed in the premises of the Web hosting company. Usually it is needed for a website (or set of related company sites)
that can develop a significant amount of traffic-for example, a site that has to handle up to 35 million hits a day. The server can
usually be configured from the client company and operated remotely. Web hosting companies claim to save router, internet
connection, security system, and network administration costs by using a dedicated server on their premises. In addition, let's have a
comparison of common networking principles and how protocols enable networked systems to be effective.
A LAN (local area network) is a group of computers and network devices connected together, usually within the same building.
A MAN (metropolitan area network) is a larger network that usually spans several buildings in the same city or town. A WAN (wide
area network), Compared to a MAN, it is not limited to a geographical location, even if it may be confined within the boundaries of a
state or country. A WAN connects multiple LANs and may be restricted to or available to the public by a company (a company or
BUS: In local area networks where bus topology is used, each node is connected to a single cable, by the help of interface connectors.
STAR: In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection.
So it can be said that every computer is indirectly connected to every other node with the help of the hub.
RING: A ring topology is a bus typology in a closed loop. Data travels around the ring in one direction. When one node sends data to
another, the data passes through each intermediate node on the ring until it reaches its destination.
MESH: The value of fully meshed networks is proportional to the exponent of the number of subscribers, assuming that
communicating groups of any two endpoints, up to and including all the endpoints, is approximated by Reed’s Law.
TREE: A tree topology (a.k.a. hierarchical topology) can be viewed as a collection of star networks arranged in a hierarchy. This tree
has individual peripheral nodes (e.g. leaves) which are required to transmit to and receive from one other node only and are not
required to act as repeaters or regenerators.
HYBRIB: Hybrid topology is also known as hybrid network. Hybrid networks combine two or more topologies in such a way that the
resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.).
DAISY: A daisy chain network topology allows the workstation to be connected in such a way that the data which has to be sent is
transmitted in a sequence.
For advance: you can compare between OSI, TCP/IP AND IPX/SPX models
TCP / IP is a model client-server, i.e. the server provides the client requests for service. OSI, in contrast, is a conceptual model. TCP /
IP is a standard protocol used for each network, including the Internet, while OSI is not a protocol, but a reference model used to
understand and design the architecture of the system. TCP / IP is a model with four layers, while OSI has seven layers. The vertical
method is followed by TCP / IP. OSI Model, on the other side, promotes the Horizontal strategy. TCP / IP is tangible while OSI is not
tangible. TCP / IP follows the strategy from top to bottom, while OSI Model follows the strategy from bottom up.
What are principles: This layer also serves as a window for accessing the network and showing the data provided to the user by the
application providers.
Application-level protocols: At the top of the layer stack OSI Reference Model
Sharing data is more essential in the client-server model, whereas peer-to-peer connectivity is more essential. Data is stored on a
centralized server in the client-server model, whereas each peer has their own information in peer-to-peer. The servers are distributed
in a peer-to-peer model in a system, so there are fewer chances of bottlenecking the server, but there is a single server serving the
clients in the client-server model, so there are more chances of bottlenecking the server. Implementation of the client-server model is
more costly than peer-to-peer. The model client-server is more scalable and stable than the peer-to-peer model.
Compare some protocols such as IMAP vs. POP3 (in Email service)
For IMAP: Emails that you have specified in your mail client will be updated on the mail server and the subsequent modifications
will appear in the inbox of your webmail. Even if you do these offline actions, the changes will be reflected online once you have
reconnected to the Internet and your mail application has synchronized with the server.
For POP3: Any emails you may have read may still appear as "fresh" in your webmail inbox,
and any responses you have sent may not appear in the products sent to your webmail (depending on your supplier and how you set up
your POP account). This pronounced contrast can cause excellent inconvenience for some customers who may prefer to synchronize
their mail customer and mail server to reduce confusion and prevent repeating the same practice.
Transport - level protocols: In the same way TCP is constructed on top of the IP at the endpoints.
Comparing UDP and TCP: TCP is connection-oriented, while UDP is connection-free. In order to transfer helpful data, TCP is
extremely reliable as it requires the acknowledgement of the information sent. Also, if any, send back the lost packets. While UDP
will not request retransmission if the packet is lost and the target computer will receive corrupt data. UDP is therefore an unreliable
protocol. Compared to UDP, TCP is slower as TCP creates the link before information is transmitted and guarantees packet delivery.
On the other side, UDP does not recognize whether or not the transmitted data is obtained. UDP header size is 8 bytes, and TCP size is
more than twice as large. TCP header size is 20 bytes since and TCP header includes choices, padding, checksum, flags, information
offset, acknowledgement number, sequence number, source and destination ports, etc. TCP and UDP can check for mistakes, but only
TCP can correct the mistake as it has both congestion and flow control.
What are principles: To allow the exchange of data via intermediate devices known as router, linked to distinct networks.
Internet protocol: is the main protocol to communicate data graphs across the network limits in the Internet protocol suite. It offers
Internet connectivity and fundamentally provides the Internet with its routing feature.
Static vs. Dynamic RoutingThe routers are manually configured and the table is also manually generated in static routing, while the
setup and table development is automatic and router driven in dynamic routing. The paths are user-defined in static routing while the
routes are updated as topology modifications in dynamic routing. No complicated algorithms are used for static routing. Dynamic
routing, on the other hand, utilizes the complicated algorithm to calculate the shortest route or path. For big networks where the
amount of hosts is high, dynamic routing is appropriate. In contrast, it is possible to implement static routing in a tiny network. If a
connection in static routing fails, the rerouting is discontinued and route traffic needs manual intervention. By comparison, dynamic
routing connection failure does not interfere with rerouting. In dynamic routing, the message broadcast and multicast makes it less
safe. On the other side, there is no static routing involving advertising which makes it safer. Protocols like RIP, EIGRP, BGP, etc. are
involved in dynamic routing. Inverse, there is no need for such protocols for static routing. No extra resources are required for static
routing, while dynamic routing needs extra resources such as memory, bandwidth, etc.
A. Workstation hardware:
• What is workstation?
A workstation is a computer intended for business or professional use (as opposed to home or recreational use) that is faster and more
skilled than a personal computer for individual u se. Small engineering companies, architects, graphic designers, and any organization,
department, or individual needing a faster microprocessor, large quantities of random access memory (RAM), and distinctive features
such as high-speed graphics adapters, use workstations and applications designed for them.
• The minimum hardware specification: NIC, mainboard, CPU, Memory, storage devices.
- NIC:
+ Definition: NIC (Network Interface Card) is a computer hardware component that connects a computer to a computer network.
+ Purpose: helping a communication among computers or laptops on the same local area network (LAN) and large-scale network
communications through routable protocols.
+ Types/Categories: Ethernet and wireless
+ Features/functions: it is a middleman between computer and network. They are responsible for translating data on the computer
into a form that can be transferred via a network cable and wireless network signal.
- Mainboard:
+ Definition: The motherboard is the key circuit board holding the essential processing parts of a computer. It allows all the parts of
your computer to receive power and communicate with one another. It is usually screwed to the case along its largest face, which
could be the bottom or the side of the case depending on the form factor and orientation.
+ Purpose: To handle all the subsystems of the computer. A chipset manages system-wide communications. The motherboard also
delivers energy to low-powered devices.
+ Types/ Categories: there are 4 types of motherboard. They are XT, AT, Baby AT, and ATX. The most common motherboard form
factor is ATX.
+Features/Functions: The primary function of a motherboard is to connect and control all computer components, accept inputs and
deliver outputs. The motherboard regulates the flow of data in a system. The CPU pins connect lea ding circuits to separate
motherboard areas, collection of data, or sending of data.
- CPU:
+ Definition: Stands for "Central Processing Unit." The primary component of the CPU is a computer processing commands. It runs
the operating system and applications, receiving on a steady basis user input or active software programs. It processes the data and
produces output that an application can store or display on the screen.
+ Purpose: The CPU depends strongly on a chipset, which is a set of microchips situated on
the motherboard, to regulate commands and information flows to and from other components of the computer.
+ Features/ Functions: The CPU is based on system clock, memory, secondary storage and address and data buses.
+ Some manufacturers: There are presently two CPU manufacturers: Intel and AMD
Memory:
+ Definition: Is any physical unit capable of momentarily storing data such as RAM (random access memory) or ROM (read-only
memory). Memory devices use embedded circuits and are used by software, hardware and operating systems.
B. Networking software:
- Helps to define locations of data storage and allows users to access that data
- Helps administrators and security system to protect the network from data breaches,
unauthorized access and attacks on a network
• The minimum networking software you mention: OS (including desktop version and server
+ Definition: An operating system (OS) is the program that manages all the other computer application programs after being loaded
into the computer by a boot program. The application programs use the operating system by requesting services through the
application program's designated interface. In addition, customers can interact directly with the operating system via a user interface
+ Purpose: Every general-purpose computer must have an operating system to run other programs and applications
+ Characteristic: Operating systems ms are different depending on the three primary characteristics of licensing, software
compatibility, and complexity.
+ Categories/Types: A mobile OS enables apps and programs to be run by smartphones, tablet PCs and other
mobile devices. A pple IOS, Google Android, Black Berry OS, and Windows 10 Mobile are mobile operating systems. An embedded
operating system is specialized for use in big devices such as vehicles, traffic lights, digital televisions, ATMs, aircraft controls, POS
terminals, digital cameras, GPS navigation systems, elevators and smart meters. A Network Operating System (NOS) is a computer
operating system mainly intended to assist workstations, personal computers and, in some cases, older terminals linked to a LAN. An
RTOS is an operating system that provides a certain capacity within a time limit. An operating system, for instance, could be intended
to guarantee that a certain product on a ssembly line was available to a robot.
+ Functions:
- Memory Management
- Processor Management
- Security
- Drivers:
+ Definition: A group of documents allowing one or more hardware systems to interact with
+ Purpose: To make abstraction possible by acting as a translator between the hardware device and the apps or operating systems
using it.
+ Categories/Types:
- BIOS
- Motherboard Drivers
- Hardware drivers
+ Functions: allows your computer’s operating system to operate some specific piece of hardware.
- Applications:
+ Definition: is software designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user.
+ Characteristic: convenience
+ Categories/Types:
- Embedded Systems
- Web Applications
- Web Services
- Console applications
+ Function:
- Managing information
- Manipulating data
- Constructing visuals
- Coordinating resources
- Calculating figures
Hardware: technological devices such as computer, servers, storage, printers, equipment, etc. Software: applications for
productivity,business, networks, systems and security, and mobile apps.
Hardware The physical and tangible components can be seen and touched. Five primary computer components are input devices,
output devices, CPU, storage devices, and memory.
Software Is instructions or programs written in distinct programming languages like JAVA, C++, Python, etc. Hardware and software
operate together to generate a productive output concurrently. If no hardware device is supported, the software can not operate. In the
meantime, if no software instructions are given, the hardware will be useless. It can be said that the hardware operates on the
software's working platform, and because of the assembly of parts into a full machine system, the working software. These are two
elements which, depending on the features of each other, operate and communicate with each other and are inseparable. We can claim
that a digital computer's core and soul is the hardware and software.
Multilayer Switch: Switch Cisco WS-C3560CX-12PC-S 12 Port Gigabit Ethernet 10/100/1000 Mbps POE, 2 x SFP (~921$)
(Source: https://thietbimangcisco.vn/cisco-ws-c3560cx-12pc-s-c-323-336-5350.html )
Server: Dell PowerEdge T30 Server - CPU G4400 / Ram 4GB / HDD 1x 1TB / Raid SATA / 1x PS (~430$)
(Source: http://nghiahung.vn/may-chu-dell-poweredge-t30-cpu-g4400-ram-4gb-hdd-1x-
1tb-raid-sata-1x-ps-10380973.html )
Switch: CISCO WS-C3650-24TS-L Catalyst 3650 24 Port Data 4x1G Uplink LAN Base (~1400$)
(Source: https://thietbimangcisco.vn/cisco-ws-c3650-24ts-l-c-323-333-5235.html)
(Source: https://www.nguyenkim.com/may-in-phun-mau-hp-deskjet-ink-avantage1115-f5s21b.html )
Computer: Desktop office computer set G41 Ram3 4G, HD 250g, 19 inch screen (~50$)
(Source: https://www.chotot.com/soc-trang/thanh-pho-soc-trang/mua-ban-may-tinh-de-ban/62822040.htm )
Amount:
• Router: ~25($)
AVERAGE VERSION:
Multilayer Switch: Cisco WS-C3850-48T-E Catalyst 3850 48 Port Data IP Services (~8870$)
(Source: https://thietbimangcisco.vn/cisco-ws-c3850-48t-e-c-323-334-5356.html )
Server: Dell PowerEdgeR430 Server (E5-2620 / 8GB / 1 * 2T SAS / optical drive / 4 backplane / 3 years on-site service) (3685$)
(Source: https://tiki.vn/dell-dell-poweredge-r730-server-e5260316gb312t-sasoptical-drive8-backplanedouble3-years-onsite-service
p8973890.html?spid=8973954&utm_source=google&utm_medium=cpc&utm_campaign=SEA_NBR_GGL_PLA_DTP_ALL_VN_A
LL_UNK_UNK_C.ALL_X.1057274772_Y.54169762056_V.8973954_W.DT_A.816359382168&gclid=Cj0KCQjwn_LrBRD4ARIs
AFEQFKvNjT1buZAl-QafsiiPxh6cV-PdnukGiuUPzL4CqMre_WL5IrgRR7YaAnmiEALw_wcB )
Switch: C9200L-48T-4X-E Cisco Catalyst 9200L 48-ports Data 4x10G uplink Switch, Network Essentials (~6893$)
(Source: https://thietbimangcisco.vn/c9200l-48t-4x-e-c-323-379-5650.html )
(Source: https://vatgia.com/5696/6411842/thong_so_ky_thuat/thi%E1%BA%BFt-b%E1%BB%8B-router-ubiquiti-unifi-erpro-8.html)
Printer: (~250$)
(Source: https://pages.lazada.vn/wow/i/vn/sell-on-lazada/register_now/?spm=a2o4n.pdp.header.d2.578b5328F1w02o )
Amount:
Multilayer Switch: Cisco Catalyst 3750X-24T catalyst 3750X 24 Port Ethernet Data Port LAN Base Switch Layer 3 - 24
x10/100/1000 (~364$)
(Source: https://thietbimangcisco.vn/cisco-ws-c3750x-24t-s-c-323-331-5376.html)
Server: Server Dell Poweregde T30 Tower: 1 x Xeon Intel Xeon E3-1225 v5 3.3G, 8M cache, 4C / 4T, turbo (80W), 8Gb
2133MT / s DDR4 ECC UDIMM Upto 64GB (~125$)
(Source: https://www.lazada.vn/products/may-tinh-chu-server-dell-power-egde-t30-tower-i200163932s250191893.html?
ef_id=CjwKCAjw5fzrBRASEiwAD2OSV9ciyWZqDcnzLCocWeqJia2u6DSlAYK5h9hsWoplCIdTq4kHJSSPxoCzBAQAvD_BwE:
G:s&s_kwcid=AL!3153!3!286178070203!!!u!296303633664!
&exlaz=d_1:mm_150050845_51350205_2010350205::12:1497503216!59440595164!!!pla296303633664!c!296303633664!
250191893!
121420745&gclid=CjwKCAjw5fzrBRASEiwAD2OSV9ciyWZqDcnzLCocWeqJia2u6DSlAYK5h9hsWoplCIdTq4kHJSSPxoCzBAQ
AvD_BwE)
Switch: Switch Aruba J9781A 2530 48 Ports 10/100, 2 fixed GE SFP ports, 2 RJ-45 autosensing 10/100/1000 ports (~1155$)
(Source: https://cnttshop.vn/switch-aruba-j9781a-2530-48-ports1g?
gclid=CjwKCAjw5fzrBRASEiwAD2OSVzmWHOXNM33FgY1nXwtZy5rkxjkZf3do5slWvVGtqDrVMwFHg00xgBoCq5gQAvD_B
wE )
Router: TP-Link Archer C5400 MU-MIMO Wi-Fi Router 3 Band AC5400 (4 x 10/100 / 1000Mbps LAN ports, 1 x 10/100/
1000Mbps WAN port, 1 x USB 3.0 port + 1 x USB 2.0 port) (~254$)
(Source: https://tiki.vn/router-wifi-tplink-archer-c5400-mumimo-gigabit-3-bang-tan-ac5400-hang-chinh-hangp3858183.html?
spid=3858185&utm_source=google&utm_medium=cpc&utm_campaign=SEA_NBR_GGL_PLA_DTP_ALL_VN_ALL_UNK_UNK
_C.ALL_X.1057274772_Y.54169762056_V.3858185_W.DT_A.816359382128&gclid=CjwKCAjw5fzrBRASEiwAD2OSV5vKEJp4
0G429RG_r3Ln5WgbKV1vFzZfnssvXphOJXrq64io8WUVQBoC1zQQAvD_BwE)
PC: Dell Optiplex 9010 Core i5 3470 desktop set, 8gb Ram, 500gb HDD and 22inch Dell Computer monitor (~254$)
(Source: https://tiki.vn/bo-may-tinh-de-ban-dell-optiplex-9010-core-i5-3470-ram-8gb-hdd-500gb-va-man-hinh-may-tinh-dell-22-
inch-hang-nhap-khau
p21405896.html?spid=21405907&utm_source=google&utm_medium=cpc&utm_campaign=SEA_NBR_GGL_PLA_DTP_ALL_VN
_ALL_UNK_UNK_C.ALL_X.2045169324_Y.75301584147_V.21405907_W.DT_A.827602579887&gclid=CjwKCAjw5fzrBRASEi
wAD2OSV7C26z1Di_yFDP4I8C35X6aCWRjhYMuLE-HkEOjRxp03t7OrjIGigxoCdm8QAvD_BwE)
Amount:
• Total: ~17019($)
P6. Test and evaluate the design to meet the requirements and analyse user feedback.
Feedback:
If there are economic conditions, I will use the most expensive of the three models because it optimizes the system
• VLAN 10: is the VLAN of the Server (Gateway: 192.168.10.1 – Network address: 192.168.10.0)
107108
• VLAN 20: is the VLAN of the Staff computer in Network room (Gateway: 192.168.20.1 – Network address:
192.168.20.10)
• VLAN 30: is the VLAN of the Higher manager room (Gateway: 192.168.30.1 – Network address: 192.168.30.10)
• VLAN 40: is the VLAN of the Teacher Room (Gateway: 192.168.40.1 – Network address: 192.168.40.10)
• VLAN 50: is the VLAN of the Staff Room (Gateway: 192.168.50.1 – Network address: 192.168.50.10)
• VLAN 60: is the VLAN for Students on the 1st and 2nd floor (Gateway: 192.168.60.1 – Network address:
192.168.60.10)
Good security.
Create VLAN30 in the Higher manager room and move the ports connecting other devices to VLAN30 like VLAN10
Do the same for VLAN40 in the Teacher room and VLAN 50 in the Staff room
Transfer PCs from static to DHCP as we did
Do the same with the printer.
Create VLAN60 for both switches on the first floor and convert the ports connected to other devices to VLAN60.
Convert IP for all PC in 1st floor
Change laptop port PT-LAPTOP-MN-1CFE to PT-LAPTOP-MN-1W
Other laptops and smartphones do the same. And SSID for each Laptop and Smartphone suitable for each room wireless device
Attach PT-CLOUD-NM-1CFE port to Cloud and Server. Delete Switch0 and PC0, then connect the wire as the picture.
Create an email with the name BDT01 to BDT42 with a common password of 123321
Enter email into each PC and Laptop in the system.
• VLAN10: Server
- Ip address: 192.168.10.10
- Gateway: 192.168.10.1
- Gateway: 192.168.20.1
- Gateway: 192.168.30.1
- Gateway: 192.168.40.1
• VLAN50: Switch3, PC13 to PC16, Priter2
- Gateway: 192.168.50.1
- Gateway: 192.168.60.1
Ping
Web – DNS:
Email:
FTP:
REFERENCE
https://www.techopedia.com/definition/30218/cloud-network
https://www.stratospherenetworks.com/advantages-and-disadvantages-of-cloud.htmlhttps://www.esds.co.in/blog/cloud-computing-
types-cloud/#sthash.djLFLvLM.dpbs
https://en.wikipedia.org/wiki/Computer_cluster
https://www.tecmint.com/what-is-clustering-and-advantages-disadvantages-of-clustering-in-linux/
https://www.webopedia.com/TERM/C/centralized_network.html
https://www.quora.com/What-are-the-advantages-and-disadvantages-of-centralized-and-Decentralized
Robot-System
https://itstillworks.com/advantages-disadvantages-virtual-private-network-8560489.html
https://www.vmware.com/solutions/virtualization.html
https://www.computerhope.com/history/network.htm
http://edutechwiki.unige.ch/en/Networking_history
https://www.networkcomputing.com/networking/6-key-milestones-computer-networking-history
https://www.techopedia.com/definition/19936/ieee-8021-working-group-ieee-8021
https://www.techopedia.com/definition/19938/ieee-8023
https://www.ionos.com/digitalguide/server/know-how/token-ring/
https://www.webopedia.com/TERM/8/802_11.html
http://www.functionx.com/networking/Lesson06.htm
https://www.teach-ict.com/gcse_new/networks/peer_peer/miniweb/pg3.htm
https://ftms.edu.my/v2/wp-content/uploads/2019/02/CN1047-Chapter-1.pdf
https://en.wikipedia.org/wiki/Personal_area_network
https://www.belden.com/blog/smart-building/network-types
http://www.itrelease.com/category/computers/
https://vittana.org/12-pros-and-cons-of-internet
http://cloudcomputingnet.com/disadvantages-of-computer-networks/
https://vittana.org/11-advantages-and-disadvantages-of-computer-networking
https://greengarageblog.org/14-main-advantages-and-disadvantages-of-computer-networking
https://www.nibusinessinfo.co.uk/content/benefits-computer-networks