0% found this document useful (0 votes)
114 views

Assignment 1

Network topology describes how devices are physically or logically connected and includes common configurations like star, mesh, ring, bus and tree. Physical topology shows the actual cabling layout while logical topology focuses on data transmission. Different topologies have advantages like fault tolerance or ease of use, but also disadvantages such as high cost or single points of failure impacting the whole network.

Uploaded by

Hoàng Ngủyên
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views

Assignment 1

Network topology describes how devices are physically or logically connected and includes common configurations like star, mesh, ring, bus and tree. Physical topology shows the actual cabling layout while logical topology focuses on data transmission. Different topologies have advantages like fault tolerance or ease of use, but also disadvantages such as high cost or single points of failure impacting the whole network.

Uploaded by

Hoàng Ngủyên
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

ASSIGNMENT 1 FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing


Unit number and title Unit 2: Networking Infrastructure
Submission date Date Received 1st submission
Re-submission Date Date Received 2nd submission
Student Name Nguyen Van Hoang GCH211244

Class Assessor name Ha Trong Thang

Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature
Grading grid

P1 P2 P3 P4 M1 M2 D1
❒ Summative Feedback: ❒ Resubmission Feedback:

Grade: Assessor Signature: Date:

Lecturer Signature:
Task 1. Discuss the benefits and constraints of different
network types and standards(P1)

1. Definition of network
Network are two or more computers linked together that can share
resources like printers, internet connections, software, and so on. It is a
grouping of systems and gadgets.

A network connects PCs/Laptops and gadgets within a specific range;


often, just one device has control or authorization to operate the whole
system.
For example, the net shop is a visual representation of a network. We
are aware that the Internet connection may be sporadic or entirely lost at
times, but the server retains complete control over the network's clients.
2. Network types:
a. LAN:

· Benefits: - High transmission speed, ability to connect several


devices rapidly
- Low cost, simple network administration.

· Drawbacks: - The transmission line is short and can only operate


in a remote location.
b. WAN:

· Benefits:
- Can connect to a private network as well as construct massive
connections that span a whole nation or the globe.

- The ability to transmit connection signals is extremely broad


and limitless.
- The ability to restrict user access
- Excellent security
- Quickly and simply share information.

· Drawbacks:
- The connection is quite poor due to the low bandwidth.

- Expensive installation and complex network administration.


c. MAN:

Benefits: -Provide high-speed connections of hundreds of Mb/s that


can be expanded to 1 Gb/s.
-Trend of multi-service with the high bandwidth requirement.

Drawbacks:- Has limited bandwidth to execute apps, e-commerce


services, and banking system applications.
-The connection range is rather broad.
-Expensive.
-The administration of a MAN network is complicated.
d.WLAN:

· Benefits:- Cost savings


-When there is a significant rise in the number of visitors,
Easy Expansion can adapt quickly.
-Setting up a wireless network is simple.

· Drawbacks: -The network speed is significantly lower than that of


traditional cable networks.
-The major drawback of wireless networks is security.
Because the signal transmission medium is waves and the signal
transmission medium is air, the probability of being attacked is relatively
high.
3. Protocol and Standards
a.Protocol

· Definition: A network protocol is a set of rules that govern how data is


formatted, sent, and received by computer network devices, ranging
from servers and routers to endpoints, regardless of their underlying
infrastructures, designs, or standards.
A protocol defines the format and order of messages exchanged
between two or more communicating entities and the actions taken on
the transmission and/or receipt of a message or other event.

· Purposes: Network protocol allows connected devices to


communicate with each other, regardless of any differences in their
internal processes, structure, or design. Network protocols are why
we can easily communicate with people worldwide, and thus play a
critical role in modern digital communications.

· Some common protocols:


-TCP (Transport Control Protocol): TCP is a transport layer protocol that
assures data delivery reliability. TCP is designed to work with IP, and
the two protocols are sometimes referred to as TCP/IP.
-HTTP: The Hypertext Transfer Protocol (HTTP) is the foundation of the
World Wide Web, the Internet via which the majority of users
communicate. It's used to send and receive data between devices.
HTTP is part of the application layer (layer 7) since it converts data into
a format that programs (such as browsers) can utilize right away.
-HTTPS: HTTP is insecure because it is not encrypted; any attacker
who intercepts an HTTP message may read it. By encrypting HTTP
transmissions, HTTPS (HTTP Secure) corrects this flaw.
-TLS/SSL: Transport Layer Security (TLS) is the encryption mechanism
used by HTTPS. Secure Sockets Layer was the previous name for TLS
(SSL)
-UDP: At the transport layer, the User Datagram Protocol (UDP) is a
quicker but less reliable alternative to TCP. It is frequently used in
applications like video streaming and gaming, where data transmission
speed is critical.
-ICMP: The Internet Control Message Protocol (ICMP) is a protocol that
reports faults and changes status. If a router is unable to deliver a
packet, for example, it will return an ICMP message to the packet's
source.

b.Standard
· Some standard organizations
-ISO: The International Organization for Standardization
-ITU: The International Telecommunication Union
-ANSI: The American National Standards Institute
-NIST: The National Institute of Standards and Technology
- Ecma International
· The names of the standards used in the network:
-WiFi 802.11 a/g/n/ac,
- IEEE 802.3
- RS-232C cable
- RFCs
- Ethernet
- V.92

Task 2: Explain the impact of network


topology, communication, and bandwidth requirements(P2)
1. Network topology

· Provides different configurations that are used to create a network


· Is a pattern of network devices and describes the way in which these
devices are connected.
*Types of topology
Physical Topology:

-Physical topology refers to the interconnected structure of a local area


network (LAN). The method employed to connect the physical
devices on the network with the cables, and the type of cabling used,
all constitute the physical topology.
Logical Topology:

- A logical topology is a concept in networking that defines the


architecture of the communication mechanism for all nodes in a
network. Using network equipment such as routers and switches, the
logical topology of a network can be dynamically maintained and
reconfigured.
*The difference between physical topology and logical
topology

Physical Topology Logical Topology

Depicts the physical layout of the Depicts logistics of the network


network. concerned with the transmission of data.

The layout can be modified based There is no interference and


on needs. manipulation involved here.

It can be arranged in star, ring, It exists in bus and ring topologies.


mesh, and bus topologies.

This has a major impact on the This has a major impact on the speed
cost, scalability, and bandwidth and delivery of data packets. It also
capacity of networks based on the handles flow control and ordered
selection and availability of delivery of data packets.
devices.

The physical connection of the Data path followed of the network.


network.

It is an actual route concerned It is a high-level representation of data


with the transmission. flow.
Examples of popular topologies

Topologies Advantages Disadvantages

Mesh ● Improves fault ● Difficult to install


tolerance and manage
● Failure of one ● Each link from
link does not affect one device to
the entire network other requires
● Centralized individual NIC
management is not ● Expensive
required

Star ● Easy to install, ● High cost


configure, manage ● Everything
and expand depends on the
● Centralized central device
management ● High
● Additional or maintenance
removal does not ● Immobile
affect the whole network
network
Bus ● Easy to connect ● Size limitations
a device ● Additional
● Cost-effective devices slow the
method of setup ● network
Independent work ● Limited security
by each device options
● Support multiple ● Higher
peripheral maintenance cost
● Ease of
extension
Ring ● Reliable and ● More cabling is
offers greater required
speed compared to bus
● No collisions topology
● Handle a large ● One faulty
volume of traffic device affects the
entire network
● Addition of
devices affects
network
Tree ● Easy to expand ● Difficult to
the network configure.
● Point-to-point ● If backbone
wiring for each breaks, the entire
device network goes
● Fault detection is down
easy ● More expensive
Hybrid ● Used for creating ● Installation and
larger networks configuration are
● Handles a large difficult
volume of traffic ● More expensive
● Fault detection is than other
easy topologies
● More cabling is
required
2. Communication and bandwidth requirements
A.Network communication
1. Network communication
Definition: Network communication or internetworking, defines a set of
protocols (that is, rules and standards) that allow application programs
to talk with each other without regard to the hardware and operating
systems where they are run. Internetworking allows application
programs to communicate independently of their physical network
connections.
2. Rules of network
● An identified sender and receiver
● Agree upon the method of communicating ( face-to-face, telephone,
letter, photograph)
● Common language and grammar
● Speed and timing of delivery
● Confirmation or acknowledgment requirements
Why these rules are needed
-Communication protocols are vital in telecommunications and other
systems because they ensure that messages are sent and received in a
consistent and universal manner.

B. Bandwidth
What is network bandwidth?
Network bandwidth is a measurement indicating the maximum capacity
of a wired or wireless communications link to transmit data over a
network connection in a given amount of time. Typically, bandwidth is
represented in the number of bits, kilobits, megabits, or gigabits that can
be transmitted in 1 second. Synonymous with capacity, bandwidth
describes data transfer rate. Bandwidth is not a measure of network
speed -- a common misconception.
Why bandwidth is important:
Bandwidth is not an unlimited resource. In any given deployment
location, such as a home or business, there is only so much capacity
available. Sometimes, this is due to physical limitations of the network
device, such as the router or modem, cabling, or wireless frequencies
being used. Other times, bandwidth is intentionally rate-limited by a
network administrator or internet or wide area network (WAN) carrier.
Multiple devices using the same connection must share bandwidth.
Some devices, such as TVs that stream 4K video, are bandwidth hogs.
In comparison, a webinar typically uses far less bandwidth. Although
speed and bandwidth are not interchangeable, greater bandwidth is
essential to maintain tolerable speeds on multiple devices.

Task 2.1 - Compare common networking


principles and how protocols enable the
effectiveness of networked systems(M1)
1. The common networking principles, namely circuit switching
and packet switching.
Networking principles:
● Understand what the user needs
● Use services to protect your data don’t rely on the network.
● Design for interworking and flexibility.
Circuit switching:
Circuit switching is a method that is used when a dedicated channel or
circuit needs to be established. A channel used in circuit switching is
kept reserved and applied only when the two users need to
communicate.

Packet switching:
Packet switching is a method of grouping data transmitted over a digital
network into packets. It is a connectionless network switching method.
It never establishes any physical connection before the transmission
begins. In packet switching, before a message is transmitted, it is
divided into a number of manageable parts called packets.
Compare these two principles together, by saying the
advantages and disadvantages of each of them.

Circuit Switching Packet Switching


Advantages ● You will get the full ● This method helps
Bandwidth for the devices of different
duration of the call. speeds to
● It reduces the communicate with
amount of delay the each other.
user experiences ● High data
before and during a transmission.
call ● Helps you to
● Under circuit Instantly establish a
switching, the call connection.
should be provided ● Switching devices
with logical channels, do not need any
Bandwidth, and an massive storage.
ongoing data rate. ● Data delivery can be
● A dedicated continued
path/circuit provides even if some parts of
guaranteed data the network face link
delivery. failure issues.
● It provides
simultaneous usage
of the same channel
with the help of
multiple users.

Disadvantages ● It takes a longer time ● Under heavy use,


to set up the circuit. there can be a
● During a disaster or significant delay in
crisis, the network the process.
may become ● Packet switching
unstable or depends on a range
unavailable. of complex protocols
● Dedicating one that much be
channel to a single managed from
usage makes it deployment.
unavailable to other ● Data packets may
services. become corrupted or
● It requires more lost.
Bandwidth. ● Protocols are
● In this kind of circuit needed for a reliable
switching method, transfer.
both ends must ● Packet switching
operate at the same only provides a
rate during the entire voice call experience
connection. that may result in
● It provides an entire choppy audio,
channel to one making it tough for
service and one the users to
individual path. understand each
other.
● It helps you to
reduce costs in a
number of ways.

2. Specify how the protocols enable networked systems to


connect efficiently using these principles.
-In a packet switching mechanism, each packet includes two parts: a
header and a payload. The header carries the packet's addressing
information, which intermediate routers use to direct it to its destination.
The data is carried in the payload.
Example 1:
Packet switching is used on the Internet and most local area
networks. The Internet is implemented by the Internet Protocol Suite
using a variety of link-layer technologies. For example, Ethernet and
Frame Relay are common. Newer mobile phone technologies (e.g.,
GSM, LTE) also use packet switching.
Example 2:
The typical example of a circuit-switched network is the telephone
network, which creates paths between devices by activating switches
along the path connecting source to destination. The data is
transmitted, with no delay, through the transmission medium directly
to the destination device.
Task 3 - Discuss the operating principles of networking devices
and server types (P3)
1. Network devices:
· Router:
-Concept: A router is a device like a switch that routes data packets
based on their IP addresses. The router is mainly a Network
Layer device. Routers normally connect LANs and WANs
together and have a dynamically updating routing table based on
which they make decisions on routing the data packets. Router
divide broadcast domains of hosts connected through it.
-Operating principles: A router connects devices within a network
by forwarding data packets between them. This data can be sent
between devices, or from devices to the internet. The router does
this by assigning a local IP address to each of the devices on the
network.
· Switch:
-Concept: A switch is a multiport bridge with a buffer and a
design that can boost its efficiency(a large number of ports
imply less traffic) and performance. A switch is a data link layer
device. The switch can perform error checking before
forwarding data, which makes it very efficient as it does not
forward packets that have errors and forward good packets
selectively to the correct port only.
-Operating principles:

-Principle of operation compared to hub

In the most basic networks, devices are connected to hubs. But


there is a limit on the number of users, and the bandwidth that can
be shared on a hub-based network. The more devices that are
added to the network, the longer it takes for data to reach its
destination. A switch helps to avoid these and other limitations of
central networks.
-Principle of operation compared to router
Switches allow different devices on the network to communicate.
Routers allow different networks to communicate. A router also
connects networked computers to the Internet, so multiple users
can share the connection. And a router acts as a dispatcher. It
chooses the best path for information to be transmitted as efficiently
as possible.
· Gateway:
-Concept: A gateway, as the name suggests, is a passage to
connect two networks together that may work upon different
networking models. They basically work as the messenger
agents that take data from one system, interpret it, and
transfer it to another system. Gateways are also called
protocol converters and can operate at any network layer.
Gateways are generally more complex than switches or
routers. A gateway is also called a protocol converter.
-Operation principles: It is a point of a network that can access
other networks. Usually, a router or node in the intranet can
act as a gateway node, or the router that links the networks is
called a gateway. In large-scale enterprises, the computers
that manage the traffic between enterprise networks are
termed gateway nodes. Such as that the computers used by
Internet service providers to link varied users to each other at
an instant time to the internet are gateway nodes. In any
development team of any commercial enterprise computer
server functions as gateway nodes and they may also be a
proxy server or a firewall at times.

· Hub:
-Concept: A hub is basically a multiport repeater. A hub
connects multiple wires coming from different branches, for
example, the connector in star topology which connects
different stations. Hubs cannot filter data, so data packets are
sent to all connected devices. In other words, the collision
domain of all hosts connected through Hub remains one.
Types of Hub
Active Hub:- These are the hubs that have their own power supply
and can clean, boost, and relay the signal along with the network.
It serves both as a repeater as well as a wiring center. These are
used to extend the maximum distance between nodes.
Passive Hub:- These are the hubs that collect wiring from nodes
and power supply from the active hub. These hubs relay signals
onto the network without cleaning and boosting them and can’t be
used to extend the distance between nodes.
Intelligent Hub:- It works like active hubs and includes remote
management capabilities. They also provide flexible data rates to
network devices. It also enables an administrator to monitor the
traffic passing through the hub and to configure each port in the
hub.
-Operation principles:
When a hub receives a packet of data (an Ethernet frame) at one
of its ports from a network device, it transmits (repeats) the packet
to all of its ports to all of the other network devices. If two network
devices on the same network try to send packets at the same time
a collision is said to occur.
Hubs operate in such a way that all data received through one port
is sent to all other ports. This type of operation creates an
extremely unsecure environment and anyone can sniff the network
using a sniffer and any unencrypted traffic over the network is not
secure. Hubs are unsecure LAN devices that should be replaced
with switches for security and increased bandwidth.
· Repeater:
-Concept: A repeater operates at the physical layer. Its job is to
regenerate the signal over the same network before the
signal becomes too weak or corrupted so as to extend the
length to which the signal can be transmitted over the same
network. An important point to be noted about repeaters is
that they do not amplify the signal. When the signal becomes
weak, they copy the signal bit by bit and regenerate it at the
original strength. It is a 2-port device.

-Operation principles:
The purpose of repeater design is to push your network
signals so that they can be transmitted further.
Due to the influence of transmission line noise, the digital
signal or analog signal carrying information can only transmit
a limited distance.
The function of the repeater is to regenerate and transmit the
received signal, thus increasing the distance of the signal
transmission. It connects two or more network segments of
the same network. The repeater can connect the cables of
the two LANs, retime and regenerate the digital signals on
the cable, and then send them out. These functions are the
typical functions of the first layer of the OSI model, the
physical layer.

2. Some common types of server


Web Server:
-Concept: A web server is a software and hardware that uses
HTTP (Hypertext Transfer Protocol) and other protocols to
respond to client requests made over the World Wide Web. The
main job of a web server is to display website content through
storing, processing, and delivering web pages to users.
-Operating principles: Web server software is accessed through
the domain names of websites and ensures the delivery of the
site's content to the requesting user. The software side is also
comprised of several components, with at least an HTTP server.
The HTTP server is able to understand HTTP and URLs. As
hardware, a web server is a computer that stores web server
software and other files related to a website, such as HTML
documents, images, and JavaScript files.
· Email server:
-Concept: A mail server -- also known as a mail transfer agent,
or MTA; mail transport agent; mail router; or internet mailer --
is an application that receives an incoming email from local
users and remote senders and forwards outgoing messages
for delivery. A computer dedicated to running these
applications is also called a mail server. Microsoft Exchange,
Exim, and Sendmail are common examples of mail server
programs.
-Operating principles:

For a computer system to function as a mail server, it must


have mail server software installed. This software then allows
the system administrator to manage and create email
accounts for any of the domains hosted on the server.
Alongside that, you have protocols. Protocols are
networking-software rules that allow computers to connect to
networks everywhere so you may shop online, send emails,
and browse the internet freely. These protocols are a vital
component of your networking activity.
· DNS Server:
-Concept: The Domain Name System (DNS) turns domain
names into IP addresses, which browsers use to load
internet pages. Every device connected to the internet has its
own IP address, which is used by other devices to locate the
device. DNS servers make it possible for people to input
normal words into their browsers.
-Operating principles:
The process of DNS resolution involves converting a
hostname (such as www.example.com) into a
computer-friendly IP address (such as 192.168.1.1). An IP
address is given to each device on the Internet, and that
address is necessary to find the appropriate Internet device -
like a street address is used to find a particular home. When
a user wants to load a webpage, a translation must occur
between what a user types into their web browser
(example.com) and the machine-friendly address necessary
to locate the example.com webpage.

· DHCP Server:
-Concept: A DHCP Server is a network server that
automatically provides and assigns IP addresses, default
gateways, and other network parameters to client devices. It
relies on the standard protocol known as Dynamic Host
Configuration Protocol or DHCP to respond to broadcast queries
by clients.
-Operating principles: DHCP works at the application
layer to dynamically assign the IP address to the client and this
happens through the exchange of a series of messages called
DHCP transactions or DHCP conversations.
FTP Server:
-Concept: The File Transfer Protocol (FTP) is a
communication standard for transferring files over a
network. Designed for the client-server model architecture,
FTP servers allow users to sign in and access files.
-Operating principles:
FTP servers go beyond other servers in facilitating file
transfers over the internet. The above graphic shows how
FTP servers act as an intermediary between devices. With
two devices known as FTP clients connected to the internet
and a specific FTP server, the server enables the uploading
and downloading of data between the two parties.

Task 4 - Discuss the inter-dependence of workstation hardware


with relevant networking software. (P4)
1. Interdependence in the network:
In interdependent networks the failure of a node in one network leads to
the failure of the dependent nodes in other networks, which in turn may
cause further damage to the first network, leading to cascading failures
and possibly catastrophic consequences.
Example:
The networks of airports and seaports are interdependent in that in a given
city, the ability of that city's airport to function is dependent upon resources
obtained from the seaport or vice versa.

Workstation hardware: A workstation is a computer specially designed


for scientific or technical applications and designed mainly to be used by
only one person at a time, usually connected to a working local area
network and multi-user operating system.
Networking software: Network software is an umbrella term used to
describe a wide range of software that streamlines the operations,
design, monitoring, and implementation of computer networks.

2. The inter-dependence of workstation hardware with relevant


networking software:
-The workstation is a computer designed to be used individually and to
outperform a personal computer. Because they are PC, they can be
used independently of mainframes assuming they have their own
applications installed and stored on their own hard drives.
- A network interface card is a piece of computer hardware that groups
computers into a network, usually a local area network. Networked
computers always communicate with each other using the specified
protocol to transmit data packets. The network interface card acts as a
translator allowing the machine to send and retrieve data from each
other on the local network.
-For example, a computer that is acting as a workstation does not need
to run the server's hardware. You can install a network software Then
the computer will actually act as a network server. In fact, almost all
servers use special hardware, which enables them to handle their
inherently heavy workloads.

Task 4.1 - Explore a range of server types and justify the selection
of a server, considering a given scenario regarding cost and
performance optimization (M2)
1. Explore a range of common server types and give a brief outline
of their uses
Server is a common word in today’s networking. It refers to a specialized
computer or hardware on which the server software works and provides
services to other computers or clients. A server has many functions, and
they come in different types to facilitate different uses.
+Appication server: Also known as a type of middleware, it
occupies a substantial amount of computing region between database
servers and the end-user, and is commonly used to connect the two.
+FTP Server: It works on one of the oldest of the Internet
services, the file transfer protocol. It provides a secure file transfer
between computers while ensuring file security and transfer control.

+Groupware Server: It is a software designed that enables the


users to work together, irrespective of the location, through the Internet
or a corporate intranet and to function together in a virtual atmosphere.
+ IRC Server: It is an ideal option for those looking for real-time
discussion capabilities. Internet Relay Chat comprises different network
servers that enable the users to connect to each other on an IRC
network.
+List Server: It provides a better way of managing mailing lists.
The server can be either open interactive discussion for the people or a
one-way list that provides announcements, newsletters, or advertising.
+Mail Server: It transfers and stores emails over corporate
networks through LANs, WANs, and across the Internet.
+News Server: It serves as a distribution and delivery source for
many public newsgroups, approachable over the USENET news
network.
+Proxy Server: It acts as a mediator between a client program
and an external server to filter requests, improve performance, and
share connections.
+ Telnet Server: It enables the users to log on to a host
computer and execute tasks as if they are working on a remote
computer.
+Virtual Servers: A virtual server is just like a physical computer
because it is committed to an individual customer’s demands, can be
individually booted, and maintains the privacy of a separate computer.
Basically, the distance between shared and dedicated (hosting) servers
is reduced providing freedom to other customers, at a less cost. Now, it
has become omnipresent in the data center.
+Web Server: It provides static content to a web browser by
loading a file from a disc and transferring it across the network to the
user’s web browser. This exchange is intermediated by the browser and
the server, communicating using HTTP.

+Database server: It is similar to a data warehouse where the


website stores or keeps its data and information. A Database Server is a
computer in a LAN that is devoted to database storage and recovery.
The database server holds the Database Management System (DBMS)
and the database. Upon requests from the client machines, it searches
the database for selected records and passes them back over the
network.
2. Justify your selection, based on a given scenario regarding cost
and performance optimization.
I would choose the database server for the chosen scenario because
Database Server gives new meaning to the word performance in the
client/server world. Performance developments are achieved primarily
by reducing network traffic, intelligently maintaining database files, and
providing intelligent lock management. When associated with other
leading server solutions, Advantage Database Server offers exceptional
performance without the overhead associated with other SQL-based
database management systems. The cost will be it will cost around $499
dollars and the reason why I choose a database server is that for the
given scenario being a college having a database server will be helpful
for looking for student records.
References:
1. fcit.usf.edu (network, lan, wan,....)
2.techtarget.com; Wikipedia (protocol, standard, and organization)
3.BeginnersBook.Computer Network Topology –Mesh, Star, Bus, Ring,
and Hybrid.
4. Wikipedia (2020), Paket switching, Wikipedia.com. Available:
https://en.wikipedia.org/wiki/Packet_switching
5. Geeksforgeeks (2020), network devices, geeksforgeeks.com. Available
at:
https://www.geeksforgeeks.org/network-devices-hub-repeater-bridge-swit
ch-router-gateways/
6) Tutorialspoint (2019), Network software, tutorialspoint.com. Available
at: https://www.tutorialspoint.com/Network-Software
7.NewHorizons.Network server types.
https://www.nhgeorgia.com/blog/network-server-types-explained-6

You might also like