Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Networking: Understanding Different Network Types, Protocols, and Devices, Assignments of Computer Science

An in-depth analysis of various network types, their benefits, constraints, and the protocols used for communication. It also discusses the operating principles of networking devices and server types. a logical topology diagram, explanations of logical and physical design, and a step-by-step configuration of network devices.

Typology: Assignments

2021/2022

Uploaded on 08/11/2022

logan_99
logan_99 🇻🇳

5

(1)

5 documents

1 / 52

Toggle sidebar

Related documents


Partial preview of the text

Download Networking: Understanding Different Network Types, Protocols, and Devices and more Assignments Computer Science in PDF only on Docsity! ASSIGNMENT FRONT SHEET Qualification BTEC Level 5 HND Diploma in Computing Unit number and title Unit 2: Networking Infrastructure Submission date 28/12/2021 Date Received 1st submission Re-submission Date Date Received 2nd submission Student Name Le Duy Long Student ID GCD210508 Class GCD1001 Assessor name Dang Quang Hien Student declaration I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that making a false declaration is a form of malpractice. Student’s signature Long Grading grid P1 P2 P3 P4 P5 P6 P7 P8 M1 M2 M3 M4 D1 D2 D3 ❒ Summative Feedback: ❒ Resubmission Feedback: Grade: Assessor Signature: Date: Signature & Date: a/Local Area Network (LAN): LANs are a network that design in a small geographical area. b/Wide Area Network (WAN). are a network that design in a large geographical area. WANs are managed by service providers (SPs) or Internet service providers (ISPs). Other types of networks include: Metropolitan Area Network (MAN), Wireless LAN (WLAN), and Storage Area Network (SAN) • Benefit of the network (Cisco Press) -Networks support the way we learn: Networking is great for sharing ideas and knowledge. Whether it’s asking for feedback or discussing your point of view, it will help you expand your knowledge and allow you to see things from another perspective. -Networks support the way we communicate: Changes in network communications have enabled friends, families, and businesses to communicate in ways that could only be imagined by previous generations. - Networks support the way we work: In the business world, data networks were initially used by businesses to internally record and manage financial information, customer information, and employee payroll systems. -Networks support the way we play: the Internet is used for traditional forms of entertainment. We listen to recording artists, preview or view motion pictures, read entire books, and download material for future offline access. Live sporting events and concerts can be experienced as they are happening or recorded and viewed on demand. • Constraint of the network 1/Network design are existing factors that cannot predicted how they impact in architecture and functional requirements. There are some common constrains have a significant effect on network. 2/Cost: we need to consider how much we invest to design the network. 3/Experiences and Expensive Staff: the network company need to hire the technicians who are expert about the new technologies, that means their salary cost very expensive to those company. 4/Location: this is the limited places relating to the effect on design. For example, the rural areas will hard design fiber presenting and just connect wireless. 5/Time: choosing an architecture take too much time when scheduling for completion of the project. Protocol and Standards Network protocol definition: A network protocol is a set of established rules that dictate how to format, transmit and receive data so that computer network devices -- from servers and routers to endpoints -- can communicate, regardless of the differences in their underlying infrastructures, designs or standards. • List some protocols: TCP/IP, HTTP, DNS,ICMP The following are some of the most prominent protocols used in network communication: 1/Transmission Control Protocol (TCP): TCP is a popular communication protocol which is used for communicating over a network. It divides any message into series of packets that are sent from source to destination and there it gets reassembled at the destination. 2/Internetworking Protocol (IP): IP is designed explicitly as addressing protocol. It is mostly used with TCP. The IP addresses in packets help in routing them through different nodes in a network until it reaches the destination system. It is the most popular protocol connecting the networks. 3/User Datagram Protocol (UDP): UDP is a substitute communication protocol to Transmission Control Protocol implemented primarily for creating loss-tolerating and low-latency linking between different applications. 4/Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a hypertext among two or more systems. HTML tags are used for creating links. These links may be in any form like text or images. 5/The Domain Network System (DNS) protocol helps Internet users and network devices discover websites using human-readable hostnames, instead of numeric IP addresses. 6/The Internet Control Message Protocol (ICMP) is a network layer protocol used by network devices to diagnose network communication issues. P2. Network topology & communication and Bandwidth requirements • Network topology definition and discuss the Impact of topology Topology diagrams are compulsory rules for technician working with a network. It provides a visual map of how the network is connected. There are two types of topology diagrams: Physical topology diagram: Identifies the physical location of intermediary devices, configured ports, and cable installation. Logical topology diagram: Identifies devices, ports, and the IP addressing scheme, as shown on the right in. • Examples of topology with diagrams (Mesh, Star, Bus, Ring, Tree, Hybrid) There are six types of topologies in computer networks: Mesh, Star, Bus, Ring, Tree, Hybrid Types Definition Illustration Advantages Disadvantages i. A One-to-One: referred to as unicast. The message only sent one single destination. ii. One-to-many: referred to as a multicast. The same message to a group of host destinations simultaneously. iii. A One-to-all : referred to as broadcast. The same messages sent to the destinations at the same time. c/Message Formatting and Encapsulation: before messages sent over the network, it will encapsulate in specific format – a frame. The frame like the envelope that contained the letters in. Frames have a specific destination address and source address. d/Message Timing: three are three statuses: access method, flow control and respond time out. When the data wait in the queue that cannot process to the host, the actions will response as the timeout. e/Message Size: Long messages must also be broken into smaller pieces to travel across a network. Each piece is sent in a separate frame which has its own addressing information. • Bandwidth 1/Bandwidth is the capacity of a wired or wireless network communications link to transmit the maximum amount of data from one point to another over a computer network or internet connection in each amount of time -- usually one second. Synonymous with capacity, bandwidth describes the data transfer rate. Bandwidth is not a measure of network speed -- a common misconception. 2/Bandwidth requirements for the networks Bandwidth affects how long it takes to download or upload information over the Internet. A connection that has plenty of bandwidth available provides a smooth, responsive user experience. The more available bandwidth, the more quickly data can be transferred; however, the law of diminishing returns applies here. Once you have sufficient bandwidth, Internet performance is not further affected. P3 Discuss the operating principles of networking devices and server types. Networking devices: • Servers. • Hub, routers. • Switches. • Multilayer switch, firewall, HIDS, repeaters; bridges. • Wireless devices. • Access point (wireless/wired), content filter, Load balancer, • Modem, Packet shaper, VPN concentrator. There is some the popular network device use all in the designs: Hub is a networking device which is used to connect multiple network hosts. A network hub is also used to do data transfer. A switch also works at the layer of LAN (Local Area Network), does 'filter and forwarding'. Modem stands for (Modulator plus Demodulator). That means it modulates and demodulates the signal between the digital data of a computer and the analog signal of a telephone line. A router is a network device which is responsible for routing traffic from one to another network. A bridge connects two subnetworks as a part of the same network. A repeater receives a signal and retransmits it at a higher level or higher power so that the signal can cover longer distances. • List server types: Web, file, database, combination. virtualization, terminal services server, DNS Server, Web Proxy Server FTP/DHCP server The operating principles of server types: 1. Application Servers Sometimes referred to as a type of middleware, application servers occupy a large chunk of computing territory between database servers and the end user, and they often connect the two. 2. Client Servers In the client/server programming model, a server is a program that awaits and fulfills requests from client programs in the same or other computers. A given application in a computer may function as a client with requests for services from other programs and also as a server of requests from other programs. 3. Collaboration Servers with other creatures. We may require other species to live. This is termed interdependence. For instance, living beings that cannot make food for themselves need to eat other species for food. Other relationships among living things involve intimate associations and resource competition. • Define workstation hardware • A workstation is a computer reserved for users or groups of users engaged in business or professional work. It includes one or more high-resolution monitors and processors that are faster than a personal computer (PC). A workstation also has greater multitasking capabilities due to the addition of random-access memory (RAM), disk space and disk space. A workstation may also have a higher speed graphics adapter and more connected peripherals. Workstations usually are built with an optimized design for complex data manipulation and visualization. Example: include image rendering and editing, computer-aided design (CAD), animations and mathematical plots. Workstations were the first industry segment to market collaboration tools and advanced accessories and enhancements. These include 3D mice, multiple displays and high performance/capacity data storage devices. • Define networking software Network software is a fundamental element for any network. It helps administrators deploy, manage and monitor a network. Traditional networks are made up of specialized hardware, such as routers and switches, and network software packages into the solution. Software-defined networks (SDNs) separate the software from hardware, making it easy to innovate and adjust the network to quickly respond to changing network needs. Network software is not the same as software applications. Network software shows the network's internal operations to administrators, while software applications allow end users to perform specific tasks. Network software is invisible to end users - it is simply used to facilitate those users to access network resources seamlessly. • Discuss and explain the intendency of workstation hardware with networking software. Derive an example from your discussion Workstation use as the personal computer, but faster and more cable than the personal computers. Because they are PCs, they can also be used independently of mainframes assuming they have their own applications installed and stored their own hard disks. The network interface card is a computer hardware that allows computers to be combined with each other on a network that is usually a local area network. Networked computers always communicate with each other using the protocol specified to transmit data packets. The network interface card acts as a translator that allows the machine to send and retrieve data on the LAN. Information system experts often use these cards to establish a wireless or wired networks. When a request is received from computer, over the internet to the server, there are some scheduling algorithms, which determines what or resource is to be given to which request. In this way a software interacts, with the workstation hardware. P5 Provide a logical/physical design of the networked system with clear explanation and addressing table • Explain the difference between logical and physical design 1/A Logical Network Design is focused on how to layout your plant and enterprise and where you would locate key distributor points for the network as well as what types of devices and switches you should use to interconnect the plant. It can also include how to do IP addresses, VLANs, and switch configurators. 2/A Physical Network Design determines what the physical infrastructure needs to look like and how to interconnect all the devices. • Discuss and explain the USER Requirement for the design Introduction: In this section as a network designer. I would like to present the network design of a 3 building. Building: 3 floors, all computers and printers are on the ground floor apart from the IT labs – one lab located on the first floor, and another located on the second floor. The network devices I use in this design include DNS server, Web server, DHCP, Mail server 5 Switches. • Provide a physical design of the network based on user requirement UNIVERSITY of GREENWICH anon tn GET anstn Block3-VLAN30:192.168.30.0/24 Printer-PT, Manage, PC- Managier4 hit Ma PC-PT PC-PT PC-PT Manager2 Manager3 Managers Block4-VLAN40:192.168.40.0/24 On the first and second floor: • Provide addressing table for the network you design. For three buildings, I divided into 6 VLANs, and each one will take the unique mission. 1/VLAN10: Network Administrator (3 PCs and 5 server) 192.168.10.0/24 PC-Admin1: 192.168.10.11/24 PC-Admin2: 192.168.10.12/24 PC-Admin3: 192.168.10.13/24 DHCP Server: 192.168.10.201/24 DNS Server: 192.168.10.202/24 Web Server: 192.168.10.203/24 Mail Server: 192.168.10.204/24 Default-gateway of all devices: 192.168.10.1/24 (IP of interface in router) 2/VLAN20: Marketing (12 PCs and 1 printer) 192.168.20.0/24 PC-Marketer1:192.168.20.11/24 PC-Marketer1:192.168.20.12/24 ….. PC-Marketer12:192.168.20.22/24 Printer1: 192.168.20.100/24 Default-gateway of all devices: 192.168.20.1/24 (IP of interface in router) 3/VLAN30: Teacher (15PCs and 1 printer) 192.168.30.0/24 PC-Teacher1:192.168.30.11/24 PC-Teacher2:192.168.30.12/24 PC-Teacher3:192.168.30.13/24 PC-Teacher4:192.168.30.14/24 PC-Teacher5:192.168.30.15/24 Printer2: 192.168.30.100/24 Default-gateway of all devices: 192.168.30.1/24 (IP of interface in router) 4/VLAN40: Manager (5PCs and 1 printer) 192.168.40.0/24 PC-Manager1: 192.168.40.11/24 PC-Manager2: 192.168.40.12/24 PC-Manager3: 192.168.40.13/24 PC-Manager4: 192.168.40.13/24 Printer3: 192.168.40.100/24 Default-gateway of all devices: 192.168.40.1/24 (IP of interface in router) 5/VLAN50:Lab1 (25 PCs for students) 192.168.50.0/24 PC-Student1: 192.168.50.11/24 ... PC-Student25: 192.168.50.35/24 Web server: We choose any PC and choose Wed Brower Example: • Evaluate the design of the network 1/Show limitation of your design based on the user requirement and the strength I think users’ requirements is limited by setting too much the PCs in the Floor 1 and the Floor2. We need a Printer on the first floor, like if students do the experiments and can access to the printer section to print out the document. Also, if we expand more Pcs on the third floor, we need to set up the wireless devices for all guests or their parents to connect internet. The strength is when we separate the servers into the different room, it will be more secure to all the information without stealing from anyone. 2/What advice and solution would you provide to the network for efficiency and usage. In my opinion, we should use low-cost devices that are better than expensive in the company 1. save money 2. suitable with conditions that meet the needs of the job 3. Easy to replace damaged equipment P7 Implement a networked system based on a prepared design. - Network devices include: 5 Switch 2960 (24 ports), 1 Router 2911 (4 ports) - End devices: 3 Printers, 85 PCs, 4 Servers. - Set IP address for routers, switches, PCs, Printers and severs. (Mentioned in P5) On the Ground Floor, Floor 1 and 2, I used cable copper straight through to connect 50 PCs to 2 Switch (from number 1 to five). I connect router - switch (by using copper straight) and switch – switch (on the ground floor ) by using the copper cross-over. When I finish, I will have a design look like the picture. UNIVERSITY of GREENWICH Physical Config — CLI Attributes — lOS Command Line Interface Router>enakle Rouler#eonl t Rouler#eonl Lerminal Enler configuration commands, sue per line. Exd wilh SNTL/Z RouLes (conlig) #ial RouLer (config) #iulerface g0/0.10 RouLler (conlig-subil) Her Rouler (config-subif) #ercapsulation det tq 10 % Invalid inpul delecled al '*' macker Romter (config-suhi f) er Ronter (config-subif)#ercapsnlation dot 1 Ronter (config-subif) #ercapsnlation d Ronter (config-subi f) #ercapsnlation dot1Q 10 Router (config-subif) Hip add Ronter (config-subif)#ip add-ess 197.168.19.1 255.255.755.0 Ronter (config-subi f)#no sh Router (config-subif)#no shutdown Romter (config-subi f) #exit Router (contig) tint Router (config) #intertace 90/0 Router (contig Router (contig Router (contig i2)# ‘LINK 5 CIANGED: Intertece GigabitEthernetU/U, changed state to up IEPROIC 5 UPDOWN: Line protocol on Intertace GigabitEthernetU/U, charged SLINA-S-CHANGED: Interfece Gigabitkthernct0/0.10, changed state to up SLINSPROTC-5-UPDOWN: Line protocol on Interface Gigabitsthernct0/0.10, changed state to up Router (config-22) foxit Router (config) tint outer (config) finterface g0/0.20 outer (config-subif) t SLINA-S-CHANGED: Interfece Gigabitkthernct0/0.20, changed state to up SLINEPROTC-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0.20, changed state to up Router (config-subif) #er Router (config-subif) #ercapsulation d Router (config-subif) #ercapsulation dot1Q 20 Router (config-subif)#ip add=ess 192.168.29.1 25 255.255.0 UNIVERSITY of GREENWICH !OS Command Line Interface Rovter (ccnfig-subif) #no shutdown Router (ccnfig-subif) #exit Router (cenfig) #interface gl/0.39 Router {ccnfig-subif) # SUTNK-S-CHANGRN: Talerfece @ Router (config-subif) #eacapsulaticn dozlo 3 (conPig-subi (Hip address 192.158.30.1 (ccnfig-subif) #no shutdown (contig-subit) exit (config) #:nterface 9f/0.49 Router (ccnfig-subif) # SUTNK-S-CHANGRN: Talerfoce @ Rover 258 Rovter Router Router Router {ccnfig-subif)#no shutdewa (conPig-subi f)Hencapsulation dei 1g 40 (config-subif) #ip address 192.158.40.1 255 (contig-subit) fexit (config) #:nterface of/1.59 (config-subif) dexit (oontigh# (config) #no interface gC/1.59 (contig) fant (config) #:nterface of /2.59 (config-subif) #ea (renfig-subt f) encapsulation dor (config-subif) #encapsulation dozlg 50 (contig-eubit) ip address 192.158. 90.1 298 {config subif)#no shutdown (config-subif) dexit (renfign# nterfare g0/1.69 (config-subif) #encapsulation d (eontig-subit) ip address 192.158 {config subif)#no shut (cenfig-subif)4ao shutdows (ccnfig-subif) Hexit (configy #2nt (contig) f=ntertace at/1 {config ifi#no sh (cemfig-if)#av siutdown Rowler Rovter Router Router Router Rowler Router Router Router Router Rovter Router Router Router Router Rovter Router Q €0 aU.L 208 Router Router Router Rovter Router Router Router Router Router (ccnfig-if) # SLINK-5-CHANCED: Interfcce Cigabit3thernet0/1, 2118 hernelO/. 36, SLINEFROTO-5-UPDOWN: Line protocol on Intertace Gigapit#thernetU/U.3U, 2118 hernelO/e. 46, SLINEFROTO-S-UPDOWN: Line protocol on Intertace GigapitethernctU/U.4U, charged stale lo up changad state to up 285.255.0 charged stale lo up changed state to up 255.255.0 2bo.2bb.0 2bo.2bb.0 changsd state to_up On the Switch Lab 1: I set the trunk mode for the interface g0/2, then bring all the 24 ports into the Lab1, students can access to the data. UNIVERSITY of GREENWICH SW.G1 (config) #vlan 30 SW.G1 (config-vlan) #Teacher % Invalid input detected at '*' marker SW.G1(config-vlan) #name Teacher SW.G1(config-vlan) #exit SW.G1 (config) fexit swW.G1# %SYS-5-CONFIG I: Configured from console by console SW.Gl#show vlan brief VLAN Name Status Ports 1 default active Fa0/20, Fa0/21, Fa0/22, Fa0/23 Fa0/24, GigO/1, Gigd/2 10 NetAdmin active 20 Marketing active Fa0/1, Fa0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/6, Fa0/7, Fa0/8 Fa0/9, Fa0/10, Fa0/11, Fa0/12 Fa0/13 30 Teacher active 40 Manager active Fa0/14, Pa0/15, Fa0/16, Fa0/17 Fa0/18, Fa0/19 1002 fddi-default active 1003 token-ring-default active 1004 fddinet-default active 1005 trnet-default active swW.G14| sW.Gl1>ena SW.Gl>enable SW.Gl#show vtp st SW.Gl#show vtp status VIP Version capable sl to 2 VIP version running 22 VIP Domain Name + class VIP Pruning Mode 2 Disabled VIP Traps Generation : Disabled Device ID : 0030.A35A.8000 Configuration last modified by 0.0.0.0 at 3-1-93 00:40:52 Local updater ID is 0.0.0.0 (no valid interface found! Feature VLAN : VTP Operating Mode : Server Maximum VLANs supported locally : 255 Number of existing VLANs 29 Configuration Revision 24 OxE1 0x73 0x2A OxDA 0x61 0x66 0xC1 OxA6 OxE8 0x39 OxCE Ox0A 0xD3 Ox2D 0x4F 0x09 MDS digest SW.Gl#show vtp 2 counters WTP statistics password VTP password status VTP domain status SW.Gl#show vtp pa SW.Gl#show vtp password VIP Password: 123456 Test results against test plans: After configuration, I will move on the test result and ping to all the floor to check whether I do all right: Floor 2 ping to the Mail Server of Ground Floor (Passed). Floor 1 ping to Floor 2 (Passed) U2) UNIVERSITY of 7 GREENWICH. eee Student5 Physical Config Desktop Progr a Line 1.0 from eso eso Nees Floor | to the Teacher Room /Ground Floor: (Passed) U2) UNIVERSITY of 7 GREENWICH. eee Admin2 Physical Config Desktop F iCommand Prompt Fast Fast Fas Fast Fas Fast Fast Fast Result: for file server:(Passed) UNIVERSITY of GREENWICH anon tn GET anstn eoe Physical Config _ Services Desktop SERVICES HTTP DHCP DHCPv6 TFTP DNS. SYSLOG AAA NTP EMAIL FIP JoT VM Management Radius EAP DNS Server Programming Attributes Service Oo User Setup Username longleduy Password 123456 Write Read Delete Rename List Username Password Permission Add 1 cisco cisco RWDNL DN) Remove Student13 Physical Config | Desktop = Programming Attributes Result for Web Server: (Passed) Transport Layer: determines whether the data transfer should be in the corresponding bathtub or in one direction. Tasks such as duplicating, sorting or pouring data are done by you • receives messages from the Session over and over, converts the message into smaller units then move to Network. Session Layer: The TimeLine controls and synchronizes the conversation between two different cations. Data transfer from the source to the destination, tagging data tagging is marked and is a synchronized asset to end messages are not pre-determined and data throwing is avoided. M2 Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization We have a wide range of servers available. Each of them is designed and work on basis of different configurations. According to the market need and demand we can use the servers. Some types of servers are as follows Rack Server This server is mounted inside a rack. Self-contained, means can run as a stand-alone or networked system: its own power source, CPU, and memory. This allows to run intensive computing operations. They are highly efficient to expand with additional memory, storage, and processors. Also, smaller deployments make energy efficiency at lower cost. Since racks are densely populated which require more cooling units, which raises energy costs. Also, this makes the maintenance more difficult as it takes more troubleshooting and management time. Blade Server It is a server enclosure that houses multiple modular circuit boards called server blades. Their modern architecture supports hot swaps. Blades have small external handles, so it's a simple matter to pull out or replace them. They can scale to high performance levels, if the data center has enough energy to support the dense infrastructure. In this server it provides high processing power while taking up minimal space. Also, it allows to host primary operating systems, databases, applications, web services, and other enterprise processes and applications which satisfies a multipurpose. But disadvantage is that due to high density blade servers require advanced climate control which increase the energy cost. Tower Servers They are a stand-alone chassis configuration. This server allows their customers to customize their servers and maintain a customized upgrade path. For a smaller business that needs a single powerful server to run multiple processes and applications this will be highly a good option. They can share network storage like any other type of server. With their low component density, towers are less expensive to cool than other two servers. They are more scalable as they allow IT to customize and upgrade them based on business needs which are less expensive. Even though it allows customization high-end hardware components and software will raise the ongoing price considerably which highly increase the upgrading cost. Virtual Server It helps to reduce the distance among shared and hosting servers providing freedom to others, at a less cost. Nowadays its very popular among the data centers. So, the above discussed servers are the physical servers and here in virtual server we see how this gives a broader view and its benefits. Some of its advantageous are : They empower users to go beyond the limitations of hardware to achieve their end goals, provide centralized management and Full compatibility with applications, allows migration of servers to new hardware transparently, cost reduction is possible using small virtual servers ,less downtime, easy to change the virtual machine platform and increase its performance, virtualization software reallocates hardware resources dynamically between a virtual machine and another. The server selection is basically a function where it is selected that the where the server should computer. Before selection of any server, it is mainly observed that whether the Server meet certain expectations like regarding the cost. It should be affordable to use, and the performance optimization is very important for the improvement of the system performance. M3 Install and configure network services and applications on your choice: After doing the configuration and set the VTP mode for Router and Switches. I collected the result table: This is My Cisco Packet Tracer using to design: https://drive.google.com/file/d/1MRIzZoyszhVBMlBv72yV__ASxndoQXIz/view?usp=sharing References: [1] Unit 2 - Networking 2019, Chapter 1 - Role of Networks, University of Greenwich (Alliance with Vietnam FPT Education), United Kingdom. [2] Unit 2 - Networking 2019, Chapter 2 - System Types - Network Devices, University of Greenwich (Alliance with Vietnam FPT Education), United Kingdom. [3] Unit 2 - Networking 2019, Chapter 3 - Broadband Solutions, University of Greenwich (Alliance with Vietnam FPT Education), United Kingdom. [4] Unit 2 - Networking 2019, Chapter 4 - Networking Standards, University of Greenwich (Alliance with Vietnam FPT Education), United Kingdom. [5] Unit 2 - Networking 2019, Chapter 5 - Network Maintenance, University of Greenwich (Alliance with Vietnam FPT Education), United Kingdom. [6] Unit 2 - Networking 2019, Chapter 6 - TCP-IP, University of Greenwich (Alliance with Vietnam FPT Education), United Kingdom. [7] Unit 2 - Networking 2019, Chapter 7 - Scalable, User Requirement, University of Greenwich (Alliance with Vietnam FPT Education), United Kingdom. [8] Unit 2 - Networking 2019, Chapter 8 - Sending and Recieving Infomation, University of Greenwich (Alliance with Vietnam FPT Education), United Kingdom. [9] Unit 2 - Networking 2019, Chapter 9 - The working OSI Model, University of Greenwich (Alliance with Vietnam FPT Education), United Kingdom. [10] Unit 2 - Networking 2019, Chapter 10 - Network Topologies, University of Greenwich (Alliance with Vietnam FPT Education), United Kingdom. [11] Unit 2 - Networking 2019, Chapter 11 - Nework Protocols, University of Greenwich (Alliance with Vietnam FPT Education), United Kingdom. [12] Unit 2 - Networking 2019, Chapter 12 - Nework Cards, University of Greenwich (Alliance with Vietnam FPT Education), United Kingdom. [13] Unit 2 - Networking 2019, Chapter 13 - The cable, University of Greenwich (Alliance with Vietnam FPT Education), United Kingdom. [14] Unit 2 - Networking 2019, Chapter 14 - Servers_Request, University of Greenwich (Alliance with Vietnam FPT Education), United Kingdom. [17] https://www.transtutors.com/questions/discuss-the-interdependence-of-workstation- hardware-with- relevant-networking-softwar-2824686.htm [18] Australia, A., Brisbane, A., Melbourne, A., Perth, A., Sydney, A., Canada, A., Singapore, A., Malaysia, A., help, A., help, C., help, E., help, E., help, F., help, H., help, M., help, M., help, N., help, S. and help, S. (2019). (Solved) - Discuss the interdependence of workstation hardware with relevant... | Transtutors. [online] Transtutors.com. Available at: https://www.transtutors.com/questions/discuss-the- interdependence-of-workstation-hardware-with- relevant-networking-softwar- 2824686.htm [Accessed 26 Aug. 2019]. [19] Techopedia.com. (2019). What is a Workstation (WS)? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/5140/workstation-ws [Accessed 26 Aug. 2019]. [20] SDxCentral. (2019). What is Networking Software? and How Used in SDN?. [online] Available at: https://www.sdxcentral.com/networking/sdn/definitions/networking-software/ [Accessed 26 Aug. 2019]. [21] Sophia. (2019). The Relationship Between Hardware and Software. [online] Available at: https://www.sophia.org/tutorials/the-relationship-between-hardware-and- software [Accessed 26 Aug. 2019]. [22] En.wikipedia.org. (2019). Wireless LAN. [online] Available at: https://en.wikipedia.org/wiki/Wireless_LAN [Accessed 26 Aug. 2019]. [23] Sophia. (2019). The Relationship Between Hardware and Software. [online] Available at: https://www.sophia.org/tutorials/the-relationship-between-hardware-and-software [Accessed 26 Aug. 2019].
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved