Académique Documents
Professionnel Documents
Culture Documents
DIT PROJECT
Center: 0535
1 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
TABLE OF CONTENTS
Conclusion ------------------------------------------------------------------------------- 48
Bibliography ---------------------------------------------------------------------------------- 49
Acknowledgements ------------------------------------------------------------------------ 50
2 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
CHAPTER 1: INTRODUCTION
airline services domestic and international. They are one of the largest and
leading companies in that field as of now due to their proficient service that
understood that they have to put up facilities in every area of their key
If we think of it, the number of base stations the company has is broad
manage and operate them?” How? You know what! There is a form of inter-
networking, of which is the practice of linking hardware, software & devices for
communication purposes. This write-up will further expand on that topic and
couple of their destinations from the home base because they have loads. It
will be a Wide Area Network in a frame relay. Starting from their recent base
3 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
between local area networks (LANs) and between end-points in a wide area
network (WAN). The network connection has a cloud as the central device
that handles other networks that surround it across distant regions. Therefore
Star Topology since networks can span an entire building. In this case, the
Whereas the Star Topology is better suited for small networks, the Extended
4 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
Thai Airways enhances their Extended Star Topology through the use of Data
Mesh Topology
The Mesh Topology is a type of networking where each node must not only
capture and
This network topology connects every single node together. This will create
the most redundant and reliable network around- especially for large
networks.
If any link fails, we (should) always have another link to send data through. So
Simple: how many wires would it take to link a computer to every device on a
network of over 100 devices? Now multiply that for every device on the
network- not a pleasant number is it? Obviously you should only use this in
5 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
Network Architecture
This is the network architecture of Thai Airways that was virtually designed
6 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
interface. There are two types of Frame Relay encapsulations: Cisco and
The three LMI types are Cisco, Ansi, and Q933a. For IOS 11.2 and higher,
configuring a static Frame Relay map, is optional unless you are using
subinterfaces. The Frame Relay map will map a Layer 3 address to a local
DLCI. This step is optional because inverse-arp will automatically perform this
map for you. The syntax for a Frame Relay map is as follows:
Configuring subinterfaces
configure a subinterface, remove the IP address off the main interface and put
7 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
After entering one of these commands you will be taken to the subinterface
If you are using a multipoint subinterface, you will need to configure frame-
If you are using a point-to-point subinterface, you will need to assign a DLCI
subinterface:
8 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
Now first configure Router1. Fast Ethernet port and hostname is already
configured. Open the Command Line Interface (CLI) of Router1 and configure
serial port for frame relay encapsulation and further create sub interface for
(Configure Router 1)
R1>enable
R1#configure terminal
R1(config)#interface serial 0/0/0
R1(config-if)#encapsulation frame-relay
R1(config-if)#no shutdown
R1(config-if)#exit
R1(config-subif)#interface serial 0/0/0.102 point-to-point
R1(config-subif)#ip address 192.168.1.245 255.255.255.252
R1(config-subif)#frame-relay interface-dlci 102
R1(config-subif)#exit
R1(config)#interface serial 0/0/0.103 point-to-point
R1(config-subif)#ip address 192.168.1.249 255.255.255.252
R1(config-subif)#frame-relay interface-dlci 103
R1(config-subif)#exit
R1(config)#interface serial 0/0/0.104 point-to-point
R1(config-subif)#ip address 192.168.1.253 255.255.255.252
R1(config-subif)#frame-relay interface-dlci 104
R1(config-subif)#exit
R1(config)#ip route 192.168.1.64 255.255.255.224 192.168.1.246
R1(config)#ip route 192.168.1.96 255.255.255.224 192.168.1.250
R1(config)#ip route 192.168.1.128 255.255.255.224 192.168.1.254
R1(config)#exit
(configure Router 2)
R2>enable
R2#configure terminal
R2(config)#interface serial 0/0/0
R2(config-if)#encapsulation frame-relay
R2(config-if)#no shutdown
R2(config-if)#exit
R2(config)#interface serial 0/0/0.101 point-to-point
R2(config-subif)#ip address 192.168.1.246 255.255.255.252
R2(config-subif)#frame-relay interface-dlci 101
R2(config-subif)#exit
R2(config)#ip route 0.0.0.0 0.0.0.0 192.168.1.245
9 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
(configure Router 3)
R3>enable
R3#configure terminal
R3(config)#interface serial 0/0/0
R3(config-if)#encapsulation frame-relay
R3(config-if)#no shutdown
R3(config-if)#exit
R3(config)#interface serial 0/0/0.101 point-to-point
R3(config-subif)#ip address 192.168.1.250
255.255.255.252
R3(config-subif)#frame-relay interface-dlci 101
R3(config-subif)#exit
R3(config)#ip route 0.0.0.0 0.0.0.0 192.168.1.249
R3(config)#
(configure Router 4)
R4>enable
R4#configure terminal
R4(config)#interface serial 0/0/0
R4(config-if)#encapsulation frame-relay
R4(config-if)#no shutdown
R4(config-if)#exit
R4(config)#interface serial 0/0/0.101 point-to-point
R4(config-subif)#ip address 192.168.1.254
255.255.255.252
R4(config-subif)#frame-relay interface-dlci 101
R4(config-subif)#exit
R4(config)#ip route 0.0.0.0 0.0.0.0 192.168.1.253
R4(config)#
now verify by doing ping from pc0 to all pc. It should be pinged successfully.
Router(config-if)#encapsulation frame-relay
cisco
ANSI standard, the Cisco standard, or the ITU-T Q.933 Annex A standard.
10 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
Sets the DLCI number of 110 on the local interface and enters Frame Relay
Router(config-fr-dlci)#exit
Maps the remote IP address (192.168.100.1) to the local DLCI number (110).
protocols.
Used to help determine whether a router and Frame Relay switch are
11 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
arranged first and have IP Addresses & gateways assigned to it for necessary
are attached to a switch via a copper straight-through cable into their fast
1.) Open the switch’s command line interface (CLI) press ENTER once
2.) Type in the following commands to enable and configure the VLAN
database.
Switch>en
Switch#VLAN database
Switch(VLAN)#VLAN 10 name LAName1
Switch(VLAN)#VLAN 20 name LAName2
Switch(VLAN)#exit
The above command statements are used to name a LAN where computer
12 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
Switch>configure terminal
Switch(config)#interface fa0/2
Switch(config)#switchport mode access
Switch(config)#switchport access vlan 10
Switch(config)#
commands are used for other devices to be included in that local area
network connection. After that we shall now exit with this command:
Switch>end
Switch(config)#configure terminal
Switch(config)#interface fa0/1
Switch(config)#switchport mode trunk
Switch(config)#end
3.) When we have granted all computing devices access to a local area
Router>enable
Router#configure terminal
Router(config)#interface fa0/0
Router(config)#no shutdown
Router(config-if)#interface fa0/0.1
Router(config-subif)#encapsulation dot1q 10
Router(config-subif)#ip address 192.168.1.1 255.255.255.0
Router(config-subif)#end
Router#
5.) Close the CLI window now. That was the command to register the
router to the switch to link it with the end point devices such as
13 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
This portion of the discourse will identify the devices used for both their WAN
& LAN.
clocking and switching services in a network, which are the devices that
actually transmit data through the WAN. In most cases, these are packet
switches.
decoded to reproduce the original digital data. Modems can be used over
radio.
14 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
area networks.
computation.
ranging in size and performance from small local hubs up to the large
15 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
that are used for frequent and consistent data transfers between DTE devices
across the Frame Relay network. Communication across a PVC does not
require the call setup and termination states that are used with SVCs. PVCs
Data transfer - Data is transmitted between the DTE devices over the
virtual circuit.
DTE devices can begin transferring data whenever they are ready because the circuit
is permanently established.
16 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
encapsulation
protocol. A GRE
GRE Mechanism:
gives the ability for one side to originate and receive keepalive
packets to and from a remote router even if the remote router does
built inside another GRE IP tunnel packet. For GRE keepalives, the
the tunnel interface. This means that the GRE keepalive response
17 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
mode) – is a dedicated-connection
ATM also stands for automated teller machine, a machine that bank
18 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
terminating equipment for a specific network and typically are located on the
support:
modularity
Support for majority of existing WICs, VWICs, and VICs (data mode only)
Security
o On-board encryption
fixed-configuration
standalone devices
switches, and is a
standalone, fixed-
configuration, managed
features and offers Cisco IOS® functionality for basic data, video and
20 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
Desktop Computers – is a
to fit under the desk or in a unit that goes on top of the desk, (2) the
mouse.
printer.
21 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
used.
22 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
connected to a network.
Most NICs are designed for a particular type of network, protocol, and
end of a cable.
For example, network cables and phone cables are created using a
crimping tool to connect the RJ-45 and RJ-11 connectors to the end of
tool looks like. This example shows a tool capable of crimping both RJ-
23 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
7900 Series - A
24 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
It's very important to understand that in security, one simply cannot say
``what's the best firewall?'' There are two extremes: absolute security and
one unplugged from the network, power supply, locked in a safe, and thrown
at the bottom of the ocean. Unfortunately, it isn't terribly useful in this state. A
there, and will do whatever you tell it, without questions, authorization,
either: the Internet is a bad neighborhood now, and it isn't long before some
bonehead will tell the computer to do something like self-destruct, after which,
This is no different from our daily lives. We constantly make decisions about
what risks we're willing to accept. When we get in a car and drive to work,
there's a certain risk that we're taking. It's possible that something completely
When we get on an airplane, we're accepting the level of risk involved as the
happen to be upstairs at home, and want to leave for work, I'm not going to
jump out the window. Yes, it would be more convenient, but the risk of injury
25 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
Every organization needs to decide for itself where between the two extremes
of total security and total access they need to be. A policy needs to articulate
this, and then define how that will be enforced with practices and such.
Everything that is done in the name of security, then, must enforce that policy
uniformly.
can actually get into the security aspects of all of this. First of all, we'll get into
the types of threats there are against networked computers, and then some
Denial-of-Service
service.
The premise of a DoS attack is simple: send more requests to the machine
than it can handle. There are toolkits available in the underground community
that make this a simple matter of running a program and telling it which host
some service port, perhaps forging the packet's header information that says
where the packet came from, and then dropping the connection.
26 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
If the host is able to answer 20 requests per second, and the attacker is
sending 50 per second, obviously the host will be unable to service all of the
attacker's requests, much less any legitimate requests (hits on the web site
Such attacks were fairly common in late 1996 and early 1997, but are now
Some things that can be done to reduce the risk of being stung by a denial of
capacity
Obviously forged packets would include those that claim to come from
operating systems.
27 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
Unauthorized Access
a web server, and should provide anyone with requested web pages.
However, that host should not provide command shell access without being
sure that the person making such a request is someone who should get it,
(such as read files, mail them to other people, etc.) that an attacker should not
be able to do. This might, then, be all the access that an attacker needs. On
cause the machine to shut down every time it's started, or something similar).
In this case, the attacker will need to gain administrator privileges on the host.
28 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
Confidentiality Breaches
We need to examine the threat model: what is it that you're trying to protect
it fell into the hands of a competitor, an enemy, or the public. In these cases,
it's possible that compromise of a normal user's account on the machine can
While many of the perpetrators of these sorts of break-ins are merely thrill-
seekers interested in nothing more than to see a shell prompt for your
computer on their screen, there are those who are more malicious, as we'll
consider next. (Additionally, keep in mind that it's possible that someone who
hurt you.)
Destructive Behavior
Among the destructive sorts of break-ins and attacks, there are two major
categories.
Data Diddling.
The data diddler is likely the worst sort, since the fact of a break-in might not
he's changing the account numbers for the auto-deposit of certain paychecks.
In any case, rare is the case when you'll come in to work one day, and simply
29 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
four months after the fact. Trying to track the problem down will certainly be
difficult, and once that problem is discovered, how can any of your numbers
from that time period be trusted? How far back do you have to go before you
Data Destruction.
Some of those perpetrate attacks are simply twisted jerks who like to delete
How, though, does an attacker gain access to your equipment? Through any
connection that you have to the outside world. This includes Internet
connections, dial-up modems, and even physical access. (How do you know
that one of the temps that you've brought in to help with the data entry isn't
vulnerabilities and anything else that can get him access to your equipment?)
entry must be identified and evaluated. The security of that entry point must
30 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
Lessons Learned
From looking at the sorts of attacks that are common, we can divine a
relatively short list of high-level practices that can help prevent security
disasters, and to help control the damage in the event that preventative
This isn't just a good idea from a security point of view. Operational
requirements should dictate the backup policy, and this should be closely
coordinated with a disaster recovery plan, such that if an airplane crashes into
your building one night, you'll be able to carry on your business from another
location. Similarly, these can be useful in recovering your data in the event of
Although this should go without saying, this doesn't occur to lots of folks. As a
result, information that doesn't need to be accessible from the outside world
sometimes is, and this can needlessly increase the severity of a break-in
dramatically.
Any security system that can be broken by breaking through any one
good, and can help you protect your organization from a minor security
31 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
Be sure that someone who knows what you've got is watching the vendors'
security advisories. Exploiting old bugs is still one of the most common (and
In addition to watching what the vendors are saying, keep a close watch on
groups like CERT and CIAC. Make sure that at least one person (preferably
Having at least one person who is charged with keeping abreast of security
developments is a good idea. This need not be a technical wizard, but could
response teams, and keep track of various problems that arise. Such a
person would then be a wise one to consult with on security related issues, as
he'll be the one who knows if web server software version such-and-such has
This person should also know the ``dos'' and ``don'ts'' of security, from
32 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
Firewalls
a corporate intranet (that is, a TCP/IP network, modeled after the Internet that
intranet and the Internet, firewalls have been employed. A firewall is simply a
Bastion Host
the machine.
33 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
Router
Many routers now have the ability to selectively perform their duties,
destination service port, and so on. These can be employed to limit the
network.
into your network from the Internet should have to get through several
34 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
Proxy.
This is the process of having one host act in behalf of another. A host
that has the ability to fetch documents from the Internet might be
example, the browser will make a connection to the proxy server, and
request the given URL. The proxy server will fetch the document, and
return the result to the client. In this way, all hosts on the intranet are
Types of Firewalls
There are three basic types of firewalls, and we'll consider each of them.
Application Gateways
The first firewalls were application gateways, and are sometimes known as
proxy gateways. These are made up of bastion hosts that run special software
to act as a proxy server. This software runs at the Application Layer of our old
friend the ISO/OSI Reference Model, hence the name. Clients behind the
firewall must be proxitized (that is, must know how to use the proxy, and be
been the most secure, because they don't allow anything to pass by default,
but need to have the programs written and turned on in order to begin passing
traffic.
35 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
These are also typically the slowest, because more processes need to be
gateway.
Packet Filtering
Lists) turned on. By default, a router will pass all traffic sent it, and will do so
your security policy with regard to what sorts of access you allow the outside
36 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
(typically, the transport or session layer). Due to the lower overhead and the
fact that packet filtering is done with routers, which are specialized computers
much faster than its application layer cousins. Because we're working at a
simple matter of allowing a specific packet type to pass through the gateway.
opening things up this way might very well compromise your level of security
There are problems with this method, though. Remember, TCP/IP has
localize the traffic. We can't get all the way down to the actual host, but with
two layers of packet filters, we can differentiate between a packet that came
from the Internet and one that came from our internal network. We can
identify which network the packet came from with certainty, but we can't get
37 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
Hybrid Systems
In an attempt to marry the security of the application layer gateways with the
flexibility and speed of packet filtering, some vendors have created systems
approved at the application layer. Once this has been done, the remainder of
the connection is passed down to the session layer, where packet filters
watch the connection to ensure that only packets that are part of an ongoing
Other possibilities include using both packet filtering and application layer
your machines that provide services to the Internet (such as a public web
internal network.
38 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
internal network, will have to break through the access router, the bastion
Lots of options are available, and it makes sense to spend some time with an
expert, either in-house, or an experienced consultant who can take the time to
understand your organization's security policy, and can design and build a
firewall architecture that best implements that policy. Other issues like
design.
market. Along with commodity markets come lots of folks who are looking for
Additionally, vendors compete with each other to try and claim the greatest
security, the easiest to administer, and the least visible to end users. In order
more than the fact that it can be configured in such a way that it can pass a
of Defense ``Orange Book'' standards, C-2, B-1, and such all simply mean
39 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
This doesn't mean that it was loaded with the vendor's software at the time, or
that the machine was even usable. In fact, one vendor has been claiming their
operating system is ``C-2 Certified'' didn't make mention of the fact that their
operating system only passed the C-2 tests without being connected to any
Such gauges as market share, certification, and the like are no guarantees of
Additionally, it's important to note that many consultants these days have
become much less the advocate of their clients, and more of an extension of
the vendor. Ask any consultants you talk to about their vendor affiliations,
certifications, and whatnot. Ask what difference it makes to them whether you
choose one product over another, and vice versa. And then ask yourself if a
other black box that you plug your networks into and get a warm-fuzzy, feeling
safe and secure. The term ``firewall'' refers to a number of components that
collectively provide the security of the system. Any time there is only one
external networks, an attacker has only one thing to break (or fool!) in order to
40 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
It's important to remember that the firewall is only one entry point to your
network. Modems, if you allow them to answer incoming calls, can provide an
easy means for an attacker to sneak around (rather than through ) your front
door (or, firewall). Just as castles weren't built with moats only in the front,
for strange behavior. Its passwords need to be strong -- not ones that can be
guessed. Accounts that aren't actively used should be disabled. In short, it's
the easiest way to get into your network from remote: guard it carefully.
There are some remote access systems that have the feature of a two-part
procedure to establish a connection. The first part is the remote user dialing
into the system, and providing the correct userid and password. The system
will then drop the connection, and call the authenticated user back at a known
telephone number. Once the remote user's system answers that call, the
connection is established, and the user is on the network. This works well for
folks working at home, but can be problematic for users wishing to dial in from
41 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
Other possibilities include one-time password schemes, where the user enters
his userid, and is presented with a ``challenge,'' a string of between six and
eight numbers. He types this challenge into a small device that he carries with
him that looks like a calculator. He then presses enter, and a ``response'' is
displayed on the LCD screen. The user types the response, and if all is
correct, he login will proceed. These are useful devices for solving the
these have their own problems, as they require the user to carry them, and
No doubt many other schemes exist. Take a look at your options, and find out
how what the vendors have to offer will help you enforce your security policy
effectively.
Crypto-Capable Routers
A feature that is being built into some routers is the ability to use session
42 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
considerable expense in
between a main office and a satellite one, an expensive data line had to be
leased in order to provide direct connectivity between the two offices. Now, a
the Internet. Then, using the Internet as the medium, the two offices can
on this channel, and it's difficult to provide the other office access to ``internal''
VPNs provide the ability for two offices to communicate with each other in
such a way that it looks like they're directly connected over a private leased
line. The session between them, although going over the Internet, is private
(because the link is encrypted), and the link is convenient, because each can
see each others' internal resources without showing them off to the entire
world. A number of firewall vendors are including the ability to build VPNs in
their offerings, either directly with their base product, or as an add-on. If you
have need to connect several offices together, this might very well be the best
way to do it.
43 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
communication links present in Thai Airways wide area network (WAN) frame
delivered to a large number of receivers. The nodes in the network take care
of replicating the packet to reach multiple receivers only when necessary. The
44 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
(Wide Area Network) technology. All the remote connection points are
between sites is managed by that central point. In hub and spoke, all spokes
DLCIs are preloaded into each switch and act as road signs to the
traveling frames.
3.] Private Link – is a link that is either owned by a specific entity or a link that
Relay networks, the administration and maintenance of the network are the
45 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
Rows that are highlighted in red and marked in orange are the services opted
46 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
Mouse
Keyboard
Multimedia Speaker
CPU:
Processor: AMD Athlon II 240 (2.8G) X2 Dual Core AM3 (= Core 2 Duo 45nm)
Motherboard:Foxconn A76ML-K 3.0 AMD® 760G Chipset (up to 1GB Built-in Video) Support
Phenom II - AM3 - DDR3
Qube Premium A Chassis - Black w/ 700w PSU & Hi Def. Sound Support
TOTAL 12,799.00 PHP -
SOFTWARE COSTS
Software Item Price
Windows HPC Server 2008
17,719.60 PHP
Enterprise R2 Installation CD
Cafe Manila Server 3000 PHP -
Cafe Manila Client (for every client
300 PHP -
workstation)
TOTAL 21,019,60 PHP
47 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
CONCLUSION
for Thai Airways Network Connection. In the previous pages, it was discussed
that they are operating their communications under a Frame-Relay Wide Area
Network Type. Viewers probably have an idea of how that type of connection
how frame relays internally function by delving deep to its intimate devices.
design. Viewers should have enough knowledge on how to link its nodes by
readers the intricate concepts of frame relay. Aside from its purpose, readers
should be aware of its benefits in the computer networking aspect, like below
to name a few:
This wide area network connection type is more practical than leased
Frame relay can support voice & video data other than text & images.
48 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
(http://learn-networking.com/network-design/a-guide-to-network-topology)
(http://en.wikipedia.org/wiki/Mesh_networking)
(http://goo.gl/GDn6p)
(http://docwiki.cisco.com/wiki/Frame_Relay#Frame_Relay_Devices)
(http://en.wikipedia.org/wiki/Packet_switch)
(http://en.wikipedia.org/wiki/Serial_communication)
(http://www.cisco.com/en/US/products/ps5875/index.html)
(http://www.softchoice.com/catalog/en-us/hubs-switches-cisco-catalyst-2960-24tt-switch-WS-
C2960-24TT-L-N48913)
(http://www.cisco.com/en/US/products/hw/switches/ps628/ps627/index.html)
(http://searchenterprisedesktop.techtarget.com/definition/desktop-computer)
(http://www.topwebhosts.org/tools/rj45-wiring.php)
(http://compnetworking.about.com/od/ethernet/g/cat5-cables.htm)
(http://www.interhack.net/pubs/network-security/network-
security.html#SECTION00060000000000000000)
(http://en.wikipedia.org/wiki/Link_%28telecommunications%29)
(http://en.wikipedia.org/wiki/Multicast)
(https://learningnetwork.cisco.com/thread/4892)
(http://en.wikipedia.org/wiki/Data_link_connection_identifier)
(http://www.inetdaemon.com/tutorials/networking/lan/topology.shtml)
(http://goo.gl/3udpj)
49 0000-7999 (I-DIT)
IT207 – Network Essentials - Project 2011
ACKNOWLEDGEMENTS
God almighty for giving me the ability & skills to complete this task;
Informatics Festival Mall for the quality education & making it possible to
And so so…
50 0000-7999 (I-DIT)