You are on page 1of 24

SPECIALIST DENTAL

SERVICES
Computer System

Specialist dental services |

Contents
1.Networking infrastructure and Protocols.................................................................3
Token Ring............................................................................................................... 3
Ethernet and Structured cabling............................................................................. 3
Wi-Fi........................................................................................................................ 4
OSI 7 Layer Model................................................................................................... 4
Purpose of Seven Protocols..................................................................................... 5
Networking Components......................................................................................... 5
2.Addressing............................................................................................................... 7
Differences between a network address and a host address..................................7
Differences between Private IPv4 and public IPv4 address.....................................7
DHCP....................................................................................................................... 7
Differences IPv4 and IPv6........................................................................................ 7
Default gateway...................................................................................................... 8
Subnet Mask............................................................................................................ 8
IP routing table........................................................................................................ 9
Security.................................................................................................................... 10
Three (3) security concepts...................................................................................10
How would you ensure that there was a secure connection between the local and
head office networks?........................................................................................... 10
How would you ensure that users of the open access PC or the Wi-Fi cannot access
the local server?.................................................................................................... 10
4 measures that can help network secure.............................................................10
Biggest Threats..................................................................................................... 11
Logical network diagrams..................................................................................... 12
Allocate suitable IP address and add them in diagram..........................................12
Particular Hardware components..........................................................................12
Prices and Specification for hardware or software.................................................13
Remote access......................................................................................................... 14
VOIP....................................................................................................................... 14
Components and Outline....................................................................................... 14
Network performances.......................................................................................... 14
References................................................................................................................ 15

Specialist dental services |

Specialist dental services |

1.Networking infrastructure and Protocols


1.1 Token Ring

[Lasatha. Networkingelearnsite.blogspot.som. 2012]


Token ring is a Local area network which all computers connected in a ring or star topology and
a bit which used to prevent the collision of data between two computers that send messages at
the same time. Usually use on ring or star topology and the data rate for this network is either 4
or 16 megabits per second. There are 3 types of cable use for this network, they are type 1,3 &
6.

1.2 Ethernet and Structured cabling


Ethernet
a family of computer networking technologies which commonly used in LANs and MANs.
Structured cabling
A building or campus telecommunication cabling infrastructure that consists of a number of
standardized smaller elements.
Data rate and types of cables.

Cat-5
Cat-5e
Cat-6

100
100
100

Speed
(Mb/s)
10 100
X
X
X
X
X
X

Cat-6a

55 for 10 Gb/s
100

Length (meters)

(Gb/s)
1 10

Power over Ethernet

Mhz
100
100
250
500

X
X

X
X
X

1.3 Wi-Fi
Mobile user can connect to a local area network through wireless connection. There are two
station for this topology, first station defines the radio parameter and a connection names

Specialist dental services |


meanwhile the second station are just need to detect the connection and adjust their own
parameter to connect to the first station and to each other which known as ad hoc network.
Data rate

[Different WiFi Protocols and Data Rates. http://www.intel.com/. 14March2016]


Mostly all modem use UTP cable, which is Unshielded Twisted Pair.
Layer:
Definition:
7. Application Layer Responsible for providing end-user services.
6.
Presentation Responsible for defining the syntax which two
Layer
5. Session Layer

network hosts use to communicate.


Responsible for establishing process to process

4. Transport Layer

communications between network hosts


Responsible for managing a session between two

3. Network Layer

applications.
Responsible for establishing paths for data transfer

2. Data Link Layer

throughout the network.


Responsible for communication between adjacent

1. Physical Layer

network nodes.
Responsible for the electrical, mechanical and timing
across the link.

1.5 Purpose of Seven Protocols


HTP hypertext transfer protocol

Usually used by the worldwide.

1.4

OSI

Layer Model

Specialist dental services |

Located on Application Layer.

FTP File transfer protocol

Allows transferring file between two computers on the internet.


Located on Application Layer.

IP Internet protocol

Support unique addressing for computers on a network.


Located on Network layer

TCP Transmission Control protocol

Developed for internet to get data from one network device to other ensure proper

transmission.
Located on transport layer

POP3 Post office protocol 3

Receive and hold email for an individual.


Located on Application layer

SMTP Simple mail transfer protocol

A protocol used to retrieve e-mail from mail server.


Located on Application layer.

IMAP Internet Message Access protocol

A set of communication guidelines that allow software to transmit email over the network.
Located on Application layer.

1.6 Networking Components.


HUB
Physically connect network for communication and which also known as repeaters.
Located on physical layer
Switch
This device has many ports which can establish one to one connection between it.

Specialist dental services |


Located on Data link layer
Wireless access point
Allows wireless device to connect to wired network using Wi-Fi.
Located on Data link layer because they forwarding based on decision made looking the Mac
address table they have.
Router
This router use software to choose an output for an incoming message.
Located on Network layer

Specialist dental services |

2.Addressing
2.1 Differences between a network address and a host address.
Network address
An identifier for a node or network interface of a telecommunication network
Host address
The portion of address used to identify hosts on the network.

2.2 Differences between Private IPv4 and public IPv4 address.


Private IPv4
Private address is globally unique to IP internetwork.
Public IPv4
Public address is assigned by InterNIC and consist of class-based network IDs or blocks of
CIDR-based addresses that guaranteed to be globally unique to internet.

2.3 DHCP
Known as Dynamic Host Configuration Protocol.
Which client protocol automatically provides internet protocol host with its IP address.
Why use DHCP?
Because every device on TCP/IP- based network must have a unique IP address in order to
access the network and its resources.

2.4 Differences IPv4 and IPv6


IPv4
It is the forth version of the internet protocol which used to identify devices on network through
an addressing system.
IPv6

Specialist dental services |


It is the six version of the internet protocol which also called IPng (internet protocol next
generation) and its designed to allow the internet to grow steadily which number of host
connected and data traffic is transmitted.
Difference
IPv4 is written in decimal number as four numbers separated by periods which can be zero to
255.
IPv6 are 128-bit IP address written in hexadecimal and separated by colons.

2.5 Default gateway.

[IPV4 & Subnetting. Certiology.com. 2016]


Default gateway is a path packets use to route to destination, every host have routing table
containing explicit paths to every host on internet.
Why its needed?
Default gateway is needed when your network needs to access to resources on a different
network.

2.6 Subnet Mask.

[Abhishek Ghosh. Thecustomizewindows.com. 2014]


Subnet mask is indicating which bytes of address is the network ID and the mask consists
sequence of one which will follow sequence of zero written in same manner as IP address.

Specialist dental services |


Why is it required?
-

Automatically tell you how many hosts is allowed foe each class of network.
Required us to specify it independently.
The address doesnt give any information on the network size.

2.7 IP routing table.


IP routing table is the network that are connected to each other via router in which the router
carries the traffic from one network to others and each routing consists of destination address.

Specialist dental services |

3.Security
3.1 Three (3) security concepts.
1. Power failure
Shutting computer down suddenly without proper shutdown procedures may cause
problems with rebooting operation system.
2. Theft of computer
Losing computer may be less painful, if you use proper data backup strategy and keep
data safe storage.
3. Mechanical damage of hard drive
Hard drive of computer is the most fragile parts; they break down more often than any
other device connected to computing.

3.2 How would you ensure that there was a secure connection between
the local and head office networks?
In order to ensure a secure connection between the local and head office is to set up a VPN for
both computers. VPN is a virtual private network in which the connection can be set up between
2 computers which establishes a secure path between computer with public internet access and
a computer that is connected private network.

3.3 How would you ensure that users of the open access PC or the Wi-Fi
cannot access the local server?
To ensure the user from accessing the local server is restricting server access to members of a
group only or create a firewall rule that grant access.

3.4 Four [4] measures that can help network secure.

Limit access
Disk encryption automatically mandates the use of password.

Use secure portable storage


To prevent lost or stolen storage devices from becoming liabilities.

Use a password manager


Use different password for each website and prevent use the same password.

Specialist dental services |

Dont ignore security update


Try to update when there is available to update and set configure to auto update.

3.5 Biggest Threats

Specialist dental services |

The biggest threats for this company are ignoring the security update, which mostly they just
ignore and leave away.4.

Diagram and explanation

4.1 Logical network diagrams.

Specialist dental services |

4.2 Allocate suitable IP address and add them in diagram.

4.3 Particular Hardware components


Switch
Which is a small hardware that can joins multiple computers within one local area network.
File Server
Which Computer is responsible to storage and manage the data, in order other computer with
same network can access it.
Application Server
Which is handling all application operations between user and organize backbend.
Routers
Devices that forward data packet along network which at least connected two networks.
Web Server

Specialist dental services |


Which the computer handles the delivery of the web pages in which every server has an IP
address and domain name.
Modem
The device in which handle the enabling of computer in order to transmit data over.

4.4 Prices and Specification for hardware or software.


YEEFU

19INCH

NETWORK

SERVER

To store and manage the data, so other

RACK

devices which in same network can access

FILING

the files.
Price = $375

NUFIBER 4 UTP PORT

Are the central devices which connect the

MODE

hardware required by the visitor centre direct


to server room
Price = $35

OUMAN

2U

19INCH

APPLICATION SERVER

Which

handle

between

the

user

and

storage

and

organized the backbend.


Price = $150
File
FILE SERVER

server

is

computer

management data file. On other computer


with same network also can access the file
and data. The users can share information
without transfer the file using pen drive.
Price = $200

SWITCH

Switch is device join multiple computers


together in one Local Area Network (LAN).
Switch is very popular user used before the
routers. Now the routers become popular.
Price = $40

Specialist dental services |

Specialist dental services |

5.Remote access
5.1 VOIP
Stand for voice over IP and video conferencing.
Use IP network, namely the LAN and WAN to carry voice communication in which voices
originally carried over the circuit switched networks and designed to carry computer data and is
a packet switched network.

5.2 Components and Outline.


Components
IP phone
Gateway
Application server
Gatekeeper
Call agent
Multipoint Control unit
Voice-enabled switch
Videoconference station

5.3 Network performances.

using a flat network.


multiple subnets on a plan.
hub based network.
too many access lists.

Outline
Signaling
Database services
Call connect and disconnect
Codec operation

Specialist dental services |

References
Quora.com. N.p., 2016. Web. 3 May 2016.
N.p., 2016. Web. 3 May 2016.
"7 Greatest Causes Of Data Loss | Data Safety Tips". Databackuponlinestorage.com.
N.p., 2016. Web. 3 May 2016.
"Cabling Considerations For 10-Gigabit Ethernet". Cablinginstall.com. N.p., 2016.
Web. 3 May 2016.
"Ethernet". Wikipedia. N.p., 2016. Web. 3 May 2016.
"Explain When You Need A Default Gateway Set And Why?". Answers.yahoo.com.
N.p., 2016. Web. 3 May 2016.
Henry, Jerome. "WLAN Fundamentals > Wireless Networks And Topologies".
Ciscopress.com. N.p., 2016. Web. 3 May 2016.
"Host Address". Wikipedia. N.p., 2016. Web. 3 May 2016.
"How Does Voip Impact Network Performance - IT Answers". IT Answers. N.p., 2016.
Web. 3 May 2016.
"How To Set Up A Vpn Between Two Computers". wikiHow. N.p., 2016. Web. 3 May
2016.
mask?, Why. "Why Do We Need Subnet Mask?". Superuser.com. N.p., 2016. Web. 3
May 2016.
"Network Address". Wikipedia. N.p., 2016. Web. 3 May 2016.
Popeskic, Valter. "Voip Network Components". How does Internet work. N.p., 2012.
Web. 3 May 2016.
"Public And Private Addresses". Technet.microsoft.com. N.p., 2016. Web. 3 May
2016.
"Restrict Server Access To Members Of A Group Only". Technet.microsoft.com. N.p.,
2016. Web. 3 May 2016.
"What Is A Private IP Address?". WhatIsMyIPAddress.com. N.p., 2016. Web. 3 May
2016.
"What Is DHCP?". Technet.microsoft.com. N.p., 2016. Web. 3 May 2016.
"What Is Structured Cabling? ...And Why You Should Care". CABLExpress. N.p., 2016.
Web. 3 May 2016.
"What Is The Difference Between Ipv6 And Ipv4? - Webopedia.Com".
Webopedia.com. N.p., 2016. Web. 3 May 2016.

Specialist dental services |


"What Is Token Ring? - Definition From Whatis.Com". SearchNetworking. N.p., 2016.
Web. 3 May 2016.
"What Is Wireless LAN (WLAN Or Wireless Local Area Network)? - Definition From
Whatis.Com". SearchMobileComputing. N.p., 2016. Web. 3 May 2016.
"What Is Wireless LAN (WLAN Or Wireless Local Area Network)? - Definition From
Whatis.Com". SearchMobileComputing. N.p., 2016. Web. 3 May 2016.

www.black-box.de, Black. "Token Ring". Black-box.de. N.p., 2016. Web. 3 May 2016.
Academy, C. (2016). The Routing Table (3.5) > Cisco Networking Academy's
Introduction to Routing Dynamically. [online] Ciscopress.com. Available at:
http://www.ciscopress.com/articles/article.asp?p=2180210&seqNum=12 [Accessed
31 Jan. 2016].
Access.redhat.com, (2016). Apache ActiveMQ - Using Networks of Brokers - Network
Topologies. [online] Available at: https://access.redhat.com/documentation/enUS/Fuse_ESB_Enterprise/7.1/html/Using_Networks_of_Brokers/files/FMQNetworksTop
ologies.html [3 May 2016].
All-about-computer-parts.com, (2016). List of computer network components.
[online] Available at: http://www.all-about-computerparts.com/computer_network_components.html [3 May 2016].
Anon, (2016). [online] Available at:
https://www.cyberstreetwise.com/cyberessentials/files/requirements.pdf [3 May
2016].
Anon, (2016). [online] Available at:
http://gonda.nic.in/swangonda/pdf/0789732556.pdf [Accessed 3 May 2016].
Anon, (2016). [online] Available at: https://www.juniper.net/techpubs/en_US/learnabout/ipv4-ipv6-differences.pdf [Accessed 3 May 2016].
Anon, (2016). [online] Available at: https://www.aelius.com/njh/subnet_sheet.html
[Accessed 3 May 2016
Antoniou, S., Antoniou, S. and Antoniou, S. (2016). Basic Networking Protocols: Part
1. [online] Blog.pluralsight.com. Available at: http://blog.pluralsight.com/cisco-basicnetworking-protocol-tcp-ip [Accessed 3 May 2016].
Arkfeld, M. (2016). Network Components. [online] Elawexchange.com. Available at:
http://www.elawexchange.com/index.php?
option=com_content&view=article&id=183&Itemid=248 [Accessed 3 May 2016].
author, A. and Laurie, V. (2016). Computer Protocols- TCP,IP, UDP, POP, SMTP, HTTP,
FTP, and More. [online] Vlaurie.com. Available at:
http://vlaurie.com/computers2/Articles/protocol.htm [Accessed 3 May 2016].

Specialist dental services |


Bartelt, T. (2016). Network Topologies. [online] Wisc-Online OER. Available at:
https://www.wisc-online.com/learn/career-clusters/info-tech/cis5408/networktopologies [Accessed 3 May 2016].
Careerride.com, (2016). Network Protocols: Seven layer architecture of ISO-OSI.
[online] Available at: http://www.careerride.com/Network-Protocols-ISO-OSI.aspx
[Accessed 3 May 2016].
CCM, (2016). Introduction to Wi-Fi (802.11 or WiFi). [online] Available at:
http://ccm.net/contents/802-introduction-to-wi-fi-802-11-or-wifi [Accessed 3 May
2016].
CCM, (2016). Network topologies. [online] Available at: http://ccm.net/contents/265network-topologies [Accessed 3 May 2016].
Comptechdoc.org, (2016). Network Protocol Categories. [online] Available at:
http://www.comptechdoc.org/independent/networking/guide/netcategories.html
[Accessed 3 May 2016].
Computerhope.com, (2016). What is subnet mask?. [online] Available at:
http://www.computerhope.com/jargon/s/subnetma.htm [Accessed 3 May 2016].
Conceptdraw.com, (2016). Network Topologies. [online] Available at:
http://www.conceptdraw.com/How-To-Guide/network-topologies [Accessed 3 May
2016].
Conniq.com, (2016). Networking Guide : Network Components - Network Hardware
or Software. [online] Available at:
http://www.conniq.com/Networking_Components.htm [Accessed 3 May 2016].
Cs-study.blogspot.com, (2016). Networking Cables and Connections ~ Easy
Learning. [online] Available at: http://cs-study.blogspot.com/2012/10/networkingcables-and-connections.html [Accessed 3 May 2016].
Digitalocean.com, (2016). An Introduction to Networking Terminology, Interfaces,
and Protocols | DigitalOcean. [online] Available at:
https://www.digitalocean.com/community/tutorials/an-introduction-to-networkingterminology-interfaces-and-protocols [Accessed 3 May 2016].
Edrawsoft.com, (2016). Network Protocol - Types of Network Protocols. [online]
Available at: https://www.edrawsoft.com/Network-Protocol.php [Accessed 3 May
2016].
Edrawsoft.com, (2016). Network Topology Diagrams, Free Examples, Templates,
Software download. [online] Available at: https://www.edrawsoft.com/NetworkTopologies.php [Accessed 3 May 2016].
Ethw.org, (2016). Wireless LAN 802.11 Wi-Fi - Engineering and Technology History
Wiki. [online] Available at: http://ethw.org/Wireless_LAN_802.11_Wi-Fi [Accessed 3
May 2016].

Specialist dental services |


Fcit.usf.edu, (2016). Chapter 2: Protocol. [online] Available at:
http://fcit.usf.edu/network/chap2/chap2.htm [Accessed 3 May 2016].
Fcit.usf.edu, (2016). Chapter 4: Cabling. [online] Available at:
http://fcit.usf.edu/network/chap4/chap4.htm [Accessed 3 May 2016].
Firewall.cx, (2016). LAN Network Topologies. [online] Available at:
http://www.firewall.cx/networking-topics/general-networking/103-networktopologies.html [Accessed 3 May 2016].
Geier, E. and Geier, E. (2016). How (and why) to set up a VPN today. [online]
PCWorld. Available at: http://www.pcworld.com/article/2030763/how-and-why-to-setup-a-vpn-today.html [Accessed 3 May 2016
How does Internet work, (2011). Protocols All great networking protocols
arranged and explained. [online] Available at:
http://howdoesinternetwork.com/protocols [Accessed 3 May 2016].
Iplocation.net, (2016). What is a Subnet Mask?. [online] Available at:
https://www.iplocation.net/subnet-mask [Accessed 3 May 2016].
Lifehacker.com, (2016). [online] Available at: http://lifehacker.com/5940565/whyyou-should-start-using-a-vpn-and-how-to-choose-the-best-one-for-your-needs
[Accessed 3 May 2016].
Linfo.org, (2016). Network topology is the pattern of nodes and links. [online]
Available at: http://www.linfo.org/network_topology.html [Accessed 3 May 2016].
Linksys, (2016). Linksys Official Support - Differences between IPv4 and IPv6.
[online] Available at: http://www.linksys.com/us/support-article/?articleNum=139604
[Accessed 3 May 2016].
Linux-ip.net, (2016). 4.8. Routing Tables. [online] Available at: http://linuxip.net/html/routing-tables.html [Accessed 3 May 2016].
MakeUseOf, (2011). Understanding The Common WiFi Standards [Technology
Explained]. [online] Available at: http://www.makeuseof.com/tag/understandingcommon-wifi-standards-technology-explained/ [Accessed 3 May 2016].
Mason, A. (2016). Internet Protocol Security (IPSec) > VPNs and VPN Technologies.
[online] Ciscopress.com. Available at:
http://www.ciscopress.com/articles/article.asp?p=24833&seqNum=3 [Accessed 3
May 2016].
Mitchell, B. and Mitchell, B. (2016). An Beginner's Guide to IPs: Subnet Masks and
Subnetting. [online] About.com Tech. Available at:
http://compnetworking.about.com/od/workingwithipaddresses/a/subnetmask.htm
[Accessed 3 May 2016].

Specialist dental services |


Mitchell, B. and Mitchell, B. (2016). Exploring computer network topologies like bus,
ring and star. [online] About.com Tech. Available at:
http://compnetworking.about.com/od/networkdesign/a/topologies.htm [Accessed 3
May 2016].
Mitchell, B. and Mitchell, B. (2016). Understanding the OSI Model. [online]
About.com Tech. Available at:
http://compnetworking.about.com/cs/designosimodel/a/osimodel.htm [Accessed 3
May 2016].
Novell.com, (2016). Networking Primer: Network Topologies | Micro Focus. [online]
Available at: https://www.novell.com/info/primer/prim08.html [Accessed 3 May
2016].
Omnisecu.com, (2016). Differences Between IPv4 and IPv6. [online] Available at:
http://www.omnisecu.com/tcpip/ipv6/differences-between-ipv4-and-ipv6.php
[Accessed 3 May 2016].
Protocols, (2016). Home - Protocols. [online] Available at: http://www.protocols.com/
[Accessed 3 May 2016].
Radio-electronics.com, (2016). IEEE 802.11 Standards | WiFi Specifications | RadioElectronics.com. [online] Available at: http://www.radioelectronics.com/info/wireless/wi-fi/ieee-802-11-standards-tutorial.php [Accessed 3
May 2016].
SearchNetworking, (2016). What is protocol? - Definition from WhatIs.com. [online]
Available at: http://searchnetworking.techtarget.com/definition/protocol [Accessed 3
May 2016].
SearchNetworking, (2016). What is routing table? - Definition from WhatIs.com.
[online] Available at: http://searchnetworking.techtarget.com/definition/routing-table
[Accessed 3 May 2016].
SearchUnifiedCommunications, (2016). What is Internet Protocol? - Definition from
WhatIs.com. [online] Available at:
http://searchunifiedcommunications.techtarget.com/definition/Internet-Protocol
[Accessed 3 May 2016].
Slideshare.net, (2010). Network Cabling. [online] Available at:
http://www.slideshare.net/xinxinxin/coaxial-cable [Accessed 3 May 2016].
Slideshare.net, (2016). NETWORK COMPONENTS. [online] Available at:
http://www.slideshare.net/bwiresedrick/topic-two-nw-components-01 [Accessed 3
May 2016].
Sparrow, P. (2016). Network Topology and Types of Network Topologies ~ I Answer 4
U. [online] Ianswer4u.com. Available at:
http://www.ianswer4u.com/2011/05/network-topology-types-ofnetwork.html#axzz3udHhinlx [Accessed 3 May 2016].

Specialist dental services |


Subnetmask.info, (2016). Network Calculators. [online] Available at:
http://www.subnetmask.info/ [Accessed 3 May 2016].
Suite, T. (2016). The TCP/IP Networking Protocol Suite - For Dummies. [online]
Dummies.com. Available at: http://www.dummies.com/how-to/content/the-tcpipnetworking-protocol-suite.html [Accessed 3 May 2016
Tcpipguide.com, (2016). The TCP/IP Guide - IP Routes and Routing Tables. [online]
Available at: http://www.tcpipguide.com/free/t_IPRoutesandRoutingTables.htm
[Accessed 3 May 2016].
Technet.microsoft.com, (2016). IP Routing Table. [online] Available at:
https://technet.microsoft.com/en-us/library/cc958823.aspx [Accessed 3 May 2016].
Technet.microsoft.com, (2016). Subnets and Subnet Masks. [online] Available at:
https://technet.microsoft.com/en-us/library/cc958832.aspx [Accessed 3 May 2016].
Technet.microsoft.com, (2016). The IP routing table: TCP/IP. [online] Available at:
https://technet.microsoft.com/en-us/library/cc779122(v=ws.10).aspx [Accessed 3
May 2016].
Technet.microsoft.com, (2016). The IP routing table: TCP/IP. [online] Available at:
https://technet.microsoft.com/en-us/library/cc779122(v=ws.10).aspx [Accessed 3
May 2016].
Tldp.org, (2016). IP Routing. [online] Available at: http://www.tldp.org/LDP/nag2/x087-2-issues.routing.html [Accessed 3 May 2016].
Unicoi.com, (2016). Embedded Networking Protocols, including TCP/IPv4/IPv6 Phase2, BOOTP Client, DHCP Client, DHCP Server, DNS Resolver, NAT, PPP, PPPoE, RIP,
SNMP, SNTP, Telnet Server, TFTP Client in a prolific Embedded Networking Stack and
more from Fusion Networking Pruduct Suite (Net Stack) from Unicoi Systems. RTOS
independent and processor or CPU independent embedded networking software..
[online] Available at:
http://www.unicoi.com/product_suite_pages/fusion_networking_product_suite.htm
[Accessed 3 May 2016].
Webopedia.com, (2016). The 7 Layers of the OSI Model - Webopedia Study Guide.
[online] Available at: http://www.webopedia.com/quick_ref/OSI_Layers.asp [Accessed
3 May 2016].
Webopedia.com, (2016). What Are Network Topologies? Webopedia Study Guide.
[online] Available at: http://www.webopedia.com/quick_ref/topologies.asp [Accessed
3 May 2016].
Webopedia.com, (2016). What is Subnet Mask and Subnetting? A Webopedia
Definition. [online] Available at:
http://www.webopedia.com/TERM/S/subnet_mask.html [Accessed 3 May 2016].

Specialist dental services |


Whatisnetworking.net, (2016). Types Of Networking Cables And ConnectorsWhat Is
Networking | What is Networking. [online] Available at:
http://www.whatisnetworking.net/tag/types-of-networking-cables-and-connectors/
[Accessed 3 May 2016].
Wong, W. (2012). What's The Difference Between IPv4 and IPv6?. [online]
Electronicdesign.com. Available at: http://electronicdesign.com/embedded/whatsdifference-between-ipv4-and-ipv6 [Accessed 3 May 2016].

You might also like