Vous êtes sur la page 1sur 23

Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Introduction

This assignment will allow me to demonstrate understanding of installing


networks including the available equipment, access mechanisms, security
issue and shearing data between different sites. I shall plan the
implementation of a computer network in municipal libraries department
including the estimated coast of installing the network. The department is
responsible for ten separate branch libraries throughout the town.
Mainly this library loan books to the general public. We have ten separate
branch libraries throughout the town. Every branch has a same name but
place deferent and it has a central head office. Each branch library has a
standalone system. The department will be fully automate the library
system each branch so that loans and returns can be recorded without the
need for staff. To manually enter details such us Book, CD and DVD title,
lender, date of issue and date of return, etc. all libraries are connected in
single system for customer facilities. No need for visited every branch.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 1
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Task – 1
Investigate Method that can be used for automatic recording of library item loaned
or returned by customer. Pay particular attention to:

a) The Method of recording the item being loaned or returned.


b) The Method of recording the customer making the loan or returned the
item.
C) The due date of return will be generated for items on loan
d) How data may be required manually edited if required.
e) The Equipment required implementing this.
f) The cost to install the equipment in the ten branch libraries.

Provide a recommendation for which equipment to purchase including reason for


this recommendation.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 2
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

a)

Method of recording the library item loaned or returned are below.

 Open library management application to computer for check customer


information.
 Checking out / Returning checked out item to customer
 After finding Item, scan the Barcode / Search to find a Barcode for an item or
type the barcode of item.
 item information will be displayed on the screen and save to database on central
server, including Item name, Item title, Item type, Call no, Copy, Publication and
all information of item on loan or reserve and any fine.
 when transaction successful, the scanner and computer will beep, and the
receipt printer will print a record of the transaction

b)

Method of recording the customer making the loan or returned the item are
below.

 Open library management application to computer for check customer / item


information.
 Scan the library/membership card with the Barcode Scanner.
 Customer information Store to database on central server and display including,
User ID, user name, expiration of membership, Phone Number, date of issue
etc.
 After complete transaction, tear out the receipt and give it to the customer.
C)
The due date of return will be generated for items on loan

 Customer with regular cards can have up to 6 loans at a time


 Customer with Family cards can have up to 10.
 The loan period/due date of return is one weeks.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 3
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

 If Overdue the item, then for each time $0.50 per customer set of fine.
 Once a fine is created, it must be paid to clear the Customer's record
d)
If required to entry data manually then I can use library Entry Book, for example:

S/L no Customer Customer ID Address Item type Item title ISBN no Date of Signature
name issue
1 Jhon U08861 E1 CD Mission Y12-80 26/05/2008
2 Smith D08065 E14 DVD KARZ UC14-1 26/05/2008
3 Gayem S05665 T41/5 BOOK SADU U963-47 20/05/2008
4 Patron A00168 GF7 BOOK H.O.G T 78568 15/05/2008
5 Bond S18744 Bichdown CD IELTS-2 W85214 16/05/2008
6 Myckl N85700 T99/2 CD IELTS-4 Y 2-45-1 12/05/2008
7 Hussy S04767 43Y DVD Superman Y12-694 06/05/2008

e)
Equipment required to implementing computerized system.

 PC: pc with Intel Pentium 4 processor, 1 GB RAM, 2x*GB/1.5 TB hard disk,


10/100/1000 base-TX Network Interface Card (NIC Card)
 Server: server with Intel Core Duo 3GHz processor, redundant dual power,
4(four) SCSI hot plug hard drive with RAID controller and other features.
 Network application: windows 2003 server , Linux
 Barcode redder (Pen type readers): use for check item and customer
details, The Pen type readers consist of a light source and a photo diode that
are placed next to each other in the tip of a pen or wand. The photo diode
measures the intensity of the light reflected back from the light source and
generates a waveform that is used to measure the widths of the bars and

 Inter connecting cable: Fiber optic cable, twisted pair cable.


 NIC card: A Network Interface Card (NIC Card) will be use to interface between
a computer and network cable.
 MAC Bridge: A bridge might be used to connect two different networks.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 4
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

 Repeater: repeater will be use to connects two segment of library network


cable. It retimes and regenerates the signals to proper amplitudes and sends
them to the other segments

 Router: A router is used to route data packets between the deffrent branch
networks.
 Connector: RJ 45 connector with RJ 45 Jack and fiber optic connector.
 UPS : (for servers ) uninterrupted power supply of 12 KVA capacity with backup
time of 180 minuet at full load.

f)
The cost to install the equipment in the ten branch library

NAME Type NUMBER OF PRICE COST


EQUIPMENT
Unhitch MD210-1 Bar coda Bar coda redder 15 57.96$ 869.40$
redder
Sony VAIO JS All-in-One Pc 25 430$ 10750$
Desktop
HP rp5700 Business Pc 5 850$ 4250$
Desktop PC
Omron E32-DC-200 Fiber Optic Cable 850 mm 58.45 $ 993.65$
(50 mm)
Extreme Networks Bridge 12 149$ 1788$
Networks Summit X150-
48t
Nexans UTP category 5e UTP cable 3 box 69.50$ 208$
solid cable (Box,305m)

HP 161105-001 CPQ NIC Card 30 30$ 900$


NC3134
APC American Power UPS 30 175$ 5100$
Conversion Back-UPS RS
1300 VA 120 V UPS
System
MT-RJ Multimode Fiber Connector 20 5.10$ 102$

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 5
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Optic Connector
Netgear FVS318 10/100 Firewall Router 20 146$ 2920$
Mbps 8-Port VPN/Firewall
Router:
TOTAL COST 27881.05$

Recommendation:-

I have used network equipment to install the network in 10 branch library for
computerized system.
At first computer used, without computer we can not think computerized system, to
insure computerized system I have used to each branch of server computer Windows
2003 server data center addition application.
Windows Server 2003, Datacenter Edition is designed for infrastructures demanding
high security and reliability. Windows Server 2003 is available for x86, Itanium, and
x86_64 processors. It supports a maximum of up to 32 processors on 32-bit or 64
processors on 64-bit hardware. 32-bit architecture also limits memory addressability to
128 GB, while the 64-bit versions support up to 2 TB. Windows Server 2003,
Datacenter Edition, also allows limiting processor and memory usage on a per-
application basis.
Windows Server 2003, Datacenter Edition, also supports 8-node clustering. Clustering
increases availability and fault tolerance of server installations, by distributing and
replicating the service among many servers
And for central server I have used Linux operating system, it is designed for general
purpose use on desktops and servers, distributions may be specialized for different
purposes including: computer architecture support, embedded systems, stability,
security, localization to a specific region or language, targeting of specific user groups,
support for real-time applications, or commitment to a given desktop environment.
Furthermore, some distributions deliberately include only free software. Currently, over

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 6
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

three hundred distributions are actively developed, with about a dozen distributions
being most popular for general-purpose use

Barcode redder used for recording library item and customer detail, when a customer
want to loan or return item to library, librarian will be check item Barcode and customer
ID Barcode use an array of hundreds of tiny light sensors lined up in a row in the head
of the reader, Item and customer detail will store to database in server. Its help to
librarian for find item and customer detail quickly, I think that barcode redder will be
help to record correct information.
Interconnecting link used to establish network connection within different branch.
Without interconnecting link con not establish computerized network.
NIC Card used to connect computer with network, the purpose of the network card is to
prepare, send, and control data on the library network. A network card is the physical
interface between the computer and cable.
Bridge A bridge would allow these segments to see each other and use the same
network resources.
Firewall Modular hardware firewall system having Gigabyte Ethernet port, VPN access
port supporting DMZ configuration
Repeater used to interconnect tow part of network cable. By use repeater signal will be
proper amplitudes to send other part in long distance.
Connector used to connect cable with NIC card and other device
I have used router to routing date packet. It reads the information in each packet to tell
where it is going.
UPS: (uninterruptible power supply) USED for back up electricity, by use UPS I can be
protect data from loss when eclectic are unavailable.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 7
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Task – 2

Investigate the methods by which customer could fine


details of item for loan the whole department. As a
minimum include the flowing information:

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 8
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

a) How and where the data from all branches would be


stored.
b) The detail supplied to the customer, e.g. item name,
location, etc.
c) Security and data protection issue.

Provide a recommendation for how this search facility would


be set up.

a)

Way and location of store Data from all branches.

 From any branch data would be stored to the database by library management
application using the network.
 When input data from any branch, data would be store/update to a central
server.
 To each branch will be a server (request server).
 All branch will be maintain by Central server(database server)
 There are will be uses Hewlett-Packard 300GB universal hot-plug Ultra320 SCSI
hard drive. (The Compaq 146GB factory integrated hard drive is a storage
solution that has a FC-AL interface Type. Fiber Channel Arbitrated Loop or FC-
AL allows many servers and storage devices to be connected into a storage
network. This configuration offers flexibility, performance and reliability
advantages to high-end systems. This drive is an upgrade and has a data
transfer rate of 200MB per second and offers the flexibility and expandability to
meet any end-users growing storage capacity requirements.)
 Any one / members can fiend information of library item to any branch.
b)
The detail supplied to the customer.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 9
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

After processing loan or return item, to the customer supplied detailes including the…
1. Membership ID
2. Item name
3. Item Serial No
4. Date of issue/Return
5. Due (if any)
6. Member Address
7. Phone number

c)
Security and data protection issue for municipal library
There is no definitive blueprint for designing a secure network; network security has to
be custom tailored to fit the needs of your network, not anyone else's. Consider, for
example, a midsize law firm network. The firm may have a special case information
system that provides access to the firm's cases to lawyers while they are on the road.
While in the office, they no doubt provide all staff with a connection to the Internet.
Network security for such a firm would need to allow access to the case information
system for authorized users on the outside of the network, while simultaneously
ensuring that full access to the Internet is always available to staff on the inside of the
network.
Contrast such a firm to a standard public library with a bibliographic database that
needs to be made available to all users on the Internet and in the library. Good network
security protects your network in a manner that is consistent with its purpose. That
being said, it is important to look at network security from as many angles as possible.

Over view of Security and data protection issue of my library:

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 10
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

 The Internet is will be available for public use during library hours for the
purpose of study, reference and research,
 Patrons/Brower is required to sign an Internet Registration Form and accept this
online Internet Usage Policy.
 Patrons/ Brower are can NOT to be installing their own software programs on
the Library’s computers.
 Anti-virus is used to identify and remove computer viruses, as well as many
other types of harmful computer software, collectively referred to as malware.
While the first antivirus software was designed exclusively to combat computer
viruses.
 Database can access with a limited number of licenses needs to have regulated
access.
 I will be provide unfiltered Internet access to staff but only filtered Internet
access to patrons.
 The Library has implemented software filtering on all of its public Internet
computers. The software protects against access to visual depictions of
obscenity and materials that are "harmful to minors"
 Filtering software will block many specific sites that may be offensive to some
users, but may not block all materials that may be offensive to all users.
 Users should be aware that the Internet is not a secure medium and that third
parties May be able to obtain information regarding users' activities. However,
Ash field library will not release information on the use of specific Internet
resources by Members of the public except as required by law or necessary for
the proper operation Of the Library.

Recommendation:-

In this task I have define the way of store Data and .Where I will be store all data to
central device via branch server there are have a storage area network (NAS) for store

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 11
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

all information of municipal library The primary purpose of NAS is the transfer of data
between computer systems and storage elements and among multiple storage
elements, and to each branch have a 16 GB hard disk for store branch personal
information.
When any one search for any library item to any branch of library, if found this item in
this library then Ok, otherwise he / she can find this item to other branch of this library
by network via accessing library database on to central server. If found this item then
he or she can go physically to this library branch for collection this item.

Task – 3
Investigate the possible network topologies that could be create
the network (LAN) within each branch library and the network
arose the whole Municipal Library Department. Explain how the
topology operates.
Provide a recommendation for which topology to use for each
branch and for the whole department including reasons for this
recommendation.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 12
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Network topology is used to municipal library

The possible network topology is used to municipal library are STAR topology. That
could be used to create the network (LAN) within each breach library and the network
across the whole municipal library department.
The star LAN topology, each station is directly connected to a common central node.
Typically, each station attaches to a central node, referred to as the star coupler, via
two point-to-point links, one for transmission and one for reception. In general, there
are two alternatives for the operation of the central node. One approach is for the
central node to operate in a broadcast fashion. A transmission of a frame from one
station to the node is retransmitted on all of the outgoing links. In this case, although
the arrangement is physically a star, it is logically a bus; a transmission from any
station is received by all other stations, and only one station at a time may
successfully transmit. Another approach is for the central node to act as a frame
switching device. An incoming frame is buffered in the node and then retransmitted
on an outgoing link to the destination station.

Switch
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 13

Local Branch Central server


Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Figure: A star network for Municipal Library

Advantages of Star Network/Centralize Network


 Better performance: Passing of Data Packet through unnecessary nodes is
prevented by this topology. At most 3 devices and 2 links are involved in any
communication between any two devices which are part of this topology. This
topology induces a huge overhead on the central hub, however if the central
hub has adequate capacity, then very high network utilization by one device in
the network does not affect the other devices in the network.
 Isolation of devices: Each device is inherently isolated by the link that
connects it to the hub. This makes the isolation of the individual devices fairly
straightforward, and amounts to disconnecting the device from the hub. This
isolated nature also prevents any non-centralized failure to affect the network.
 Centralization: As the central hub is the bottleneck, increasing capacity of
the central hub or adding additional devices to the star, can help scale the
network very easily. The central nature also allows the inspection traffic
through the network. This can help analyze all the traffic in the network and
determine suspicious behavior.
 Simplicity: The topology is easy to understand, establish, and navigate. The
simple topology obviates the need for complex routing or message passing
protocols. As noted earlier, the isolation and centralization simplifies fault
detection, as each link or device can be probed individually.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 14
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Recommendation:-
I have used star topology to create network (LAN) within each branch library and the
across the whole Municipal Library Department, Because Star networks are relatively
easy to install and manage, Easy to detect faults and to remove parts, No disruptions to
the network then connecting or removing devices, Reduces risk of failure, Expanding
the network is simple and Managing the network is centralized.

Task – 4

Investigate the network media that could be used within


each branch library and to connect between deferent sites
in the whole Municipal Library Department. You will need
to investigate data transfer rate, the packages available
from supplier in your location and the cost of these.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 15
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Provide a recommendation for which topology to use for


each branch and for the whole department including
reasons for this recommendation.

The network media that could be used within each branch library:

To ensure the network media that could be used within each branch library and to
connect between different sites in the whole Municipal Library Department. I will to
need to ensure data transfer rates.

The Network media that I will be use within each Branch Library.

 Fiber optic cable (for branch to central server connection)


 Twisted cable(UTP) (for branch network connection)

Omron E32-DC-200 Fiber Optic Cable


Fiber Optic Cable Standard Detection Distance 50 Millimeters With 30 x 30 Millimeter
Opaque Object Temperature -40 to 158 Degrees Fahrenheit Minimum Object Diameter
0.003 Inch Fiber Material Core Plastic Cable Length 6 Feet Black Polyethylene General
Purpose Diffuse Type

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 16
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Figure: Omron E32-DC-200fiber optic cable

Max. Sensing Distance…………50mm


Type………...General Purpose Diffuse
Weight…………………………….0.10
Price…………………………… $58.45

Nexans UTP category 5e solid cable


Nexans are one of the world’s largest manufacturers of network and commas cabling
and comes with a 20 year guarantee. This type of network cable is used for permanent
installations and there is metro marking on the cable to show how much cable is left in
a part used box.

Figure: UTP cable

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 17
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Max. Sensing Distance ( Box) ……………… 305m


Speed and throughput…………….10 to 1000 Mbps
Price:……………………….……………….. £69.99

Recommendation:
I will be use to install municipal library network as a network media Fiber optic cable
(for connect branch with central server), UTP cable (for interconnect branch network)
Reason of choice this medium:

Fiber optic cable


 fiber optic cable is a glass or plastic fiber that carries light along its length
 transmission over longer distances and at higher bandwidths (data rates) than
other forms of communications
 Fibers are used instead of metal wires because signals travel along them with
less loss, and they are also immune to electromagnetic interference.
 Fibers are also used for illumination, and are wrapped in bun
 Specially designed fibers are used for a variety of other applications, including
sensors and fiber lasers.

UTP cable

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 18
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

 UTP cable is used in a variety of networks


 Changes in configuration are simple
 making it easy to accommodate moves
 UTP wiring is more economical than twisted
 It is less expensive to re-configure as user locations change
 It is less expensive to install
 UTP cabling offers migration to LAN without re-cabling, since the same cable is
used for both LAN and AS400.
 Speed and throughput—10 to 1000 Mbps.
 Excellent cost/quality ratio.

Task – 5

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 19
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Create a plan for Municipal Library Department network to


deal with major disasters and also to deal with the store
term failure of the system (e.g. a power cut in one branch
library). It is impotent that the system can be update after
temporary failure and that data is accessible in the event
of a major disaster.

Plan for disaster overcome in library:

Disasters in libraries have many causes, from the dramatic: arson, lightning, tornadoes,
hurricanes and earthquakes to the mundane: electrical faults, Hardware or software
failure, virus attack and burst pipes. A disaster control plan is the written documentation
that records the countermeasures taken against an event which is wholly unexpected
and damages
Building the collections of an institution. It is a document which all organizations,
Maintenance
A not just of
regime libraries,
planned should have.
and documented building maintenance will go a long way
towards minimizing the risk of floods, fire, theft, vandalism and invasion by pests.
Disastershould
Routines Plansinclude regular temperature and humidity checks in areas
Generally,as
designated a disaster plan
vulnerable to describes
damp. activities for preventative, responsive and recovery
initiatives. Typically, a disaster plan consists of the following sections:
Equipment Maintenance
Candidate name:
Equipment MD. IbrahimisAmin
maintenance NCC candidate
essential both toNO: Examination
ensure that equipment Cycle:
failure doesMarch
not2009
Assignment
cause title: Municipal
a disaster library the
and to assure department Module
reliability name: Enterprise
of equipment in aNetwork (EN)
disaster Page no: 20
situation.
Ensure that equipment stored to deal with a disaster is included in maintenance
routines
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Storage backup
I will be Keep important financial and database records organized and safe ” Make
backup copies of all critical files such as customer detail, item detail, accounting and
employee payroll data, as well as customer lists, and inventory and store these records
in a safe off-site location and ISP server. By using virtual backup method, these
methods are….
The Virtual Full Backup method was pioneered by R1Soft and overcomes limitations of
the other known backup methods.
The chief drawbacks to all of the other backup methods that Virtual Full Backups
overcome are:
 The need for a periodic Full Backup to be done e.g. every week. The weekly
Full Backup that other methods require is extremely time consuming and
intensive on critical server Disk I/O resources.
 Incremental Backup methods make restoring very complex as each incremental
must be replayed to return files to a particular point in time.
 Incremental and Differential Backup methods provide no long term archiving or
convenient rotation of old backups. For example you can not point and click

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 21
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Delete an Incremental backup without breaking other backup sets and loosing
data.
 The other backup methods are based on tape and do not properly take
advantage of disk based storage. For example a Deltas or unchanged file is
stored in every Incremental backup set multiple times. This makes sense when I
storage media am tape and it needs to be duplicate in each tape. Much Disk
Based backup use Virtual Tape Library (VTL) software to make a file appear like
a large tape. If the storage medium is Disk Based there is no need to store a
Delta or unchanged file more than once! Virtual Full Backups overcome this
limitation.

Hard copy
I will be Keep all information to hard copy in a safe off site.

Reference
Serial No URL Date Type of
reference
1 http://www.m25lib.ac.uk/m25dcp/prevent.html 18/01/2009 Text
2 http://wiki.r1soft.com/display/TP/Backup+Method+ 19/012009 Text
-+Virtual+Full+Backup75
3 http://en.wikipedia.org/wiki/Star_network 18/012009 Text
4 http://www.system3x.com/as400_cabling/ 09/022009 PDF
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 22
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

5 http://ops.fhwa.dot.gov/publications/telecomm_ 29/012009 Text


handbook/chapter2_01.htm

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 23

Vous aimerez peut-être aussi