Toaz - Info Unit 2 Assignment Brief PR

Download as pdf or txt
Download as pdf or txt
You are on page 1of 30

NET WORKING REPORT

Networking is the exchange of information and ideas among


people with a common profession or special interest,
usually in an informal social setting

Nguyen Huynh Tien Dat


ASSIGNMENT BRIEF SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number Unit 2: Networking

Assignment title Networking Infrastructure

Academic Year Fall 2019 (Part 2)

Unit Tutor Hồ Nguyễn Phú Bảo

Issue date Submission date December, 25th 2019

IV name and date Nguyễn Huỳnh Tiến Đạt

Submission format

Part 1

The submission is in the form of an individual written report. This should be written in a concise, formal
business style using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using the Harvard
referencing system. Please also provide a bibliography using the Harvard referencing system. The
recommended word limit is 2,000–2,500 words, although you will not be penalized for exceeding the total word
limit.

Part 2

The submission is in the form of an individual evidence portfolio. This assignment can be completed as a group,
but each student must produce their own portfolio, which will contain:

 A LAN design plan and blueprint and justification document.

 A fully completed test plan including an evaluation of results and recommendations for improvements to
LAN.

 A proposed and justified maintenance schedule.

Part 3

 Evidence of an implemented network.

You are required to make use of headings, paragraphs, subsections and illustrations as appropriate, and all work
must be supported with research and referenced using the Harvard referencing system.

Unit Learning Outcomes

LO1: Examine networking principles and their protocols.


LO2: Explain networking devices and operations.

LO3: Design efficient networked systems.

LO4: Implement and diagnose networked systems.

Assignment Brief

You are employed as a Network Engineer by Nguyen Networking Limited, a high-tech networking solution
development company, which have branches in Hồ Chí Minh City, Hà Nội, Đà Nẵng and Cần Thơ.

The company has been contracted to implement a networking project from a local educational institute. The
specification of the project is given below:

People: 200 students, 15 teachers, 12 marketing and administration staff, 05 higher managers including the
head of academics and the program manager, 03 computer network administrators.

Resources: 50 student lab computers, 35 staff computers, 03 printers.

Building: 03 floors, all computers and printers are on the ground floor apart from the IT labs – one lab located
on the first floor and another located on the second floor.

As a first task, the CEO of the company Mr. Nguyen has asked you to investigate and explain networking
principles, protocols and devices and submit a report.

Part 1
You will need to produce a report that includes the following:
1. An introduction to provide an overview of your report.

2. Benefits and constraints of different types of networks and networking standards.

3. The impact of network topology, speed of communication and bandwidth requirements.

4. Effectiveness of networking systems.

5. Discussion on operating principles of networking devices and server types and networking software.

6. Discuss the relationship of workstation hardware with networking software.

7. Explore a range of server types and justify the selection of a server, considering a given scenario
regarding cost and performance optimization.

8. For the given specification, identify the topology protocol for the efficient utilization of a networking
system.

The CEO Mr. Nguyen is happy with your first report and now he has asked you to analyze the specification
from the institution, as given earlier.

You need to design and implement the networking project within a given time frame:
Part 2 - Design efficient networked systems
1. Prepare a written step-by-step plan of how you are going to design a Local Area Network including a
blueprint of your LAN.

2. Justify your choice of devices for your network design.

3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost constraints as per
user specifications.

4. Justify the security requirements and quality of services needed for selection of accessories.

5. Suggest a maintenance schedule to support the networked system.

Part 3 - Implement test and diagnose networked systems


1. Implement a networked system based on your prepared design.

2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc.

3. Record the test results and analyze these against expected results.

4. Investigate what functionalities would allow the system to support device growth and the addition of
communication devices.

5. Discuss the significance of upgrades and security requirements in your recommendations.

ASSESMENT CRITERIA

Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO1 Examine networking principles and their protocols. LO1 & 2


D1 Considering a given scenario,
P1 Discuss the benefits and M1 Compare common
identify the topology protocol
constraints of different network types networking principles and selected for the efficient
and standards. how protocols enable the utilization of a networking
effectiveness of networked system.
P2 Explain the impact of network systems.
topology, communication and
bandwidth requirements.

LO2 Explain networking devices and operations

P3 Discuss the operating principles of M2 Explore a range of server


networking devices and server types. types and justify the selection
of a server, considering a
P4 Discuss the inter-dependence of given scenario regarding cost
workstation hardware with relevant and performance
networking software. optimisation.

LO3 Design efficient networked systems

P5 Design a networked system to M3 Install and configure D2 Design a maintenance


meet a given specification. network services and schedule to support the
applications on your choice. networked system.
P6 Test and evaluate the design to
meet the requirements and analyse
user feedback.

LO4 Implement and diagnose networked systems

P7 Implement a networked system M4 Recommend potential D3 Use critical reflection to


based on a prepared design. enhancements for the evaluate own work and
networked systems. justify valid conclusions.
P8 Document and analyse test results
against expected results.

Contents
P1 Discuss the benefits and constraints of different network types and standards……………..6
P2 Explain the impact of network topology, communication and bandwidth requirements…..11
P3 Discuss the operating principles of networking devices and server types………………………15
P4 Discuss the inter-dependence of workstation hardware with relevant networking software……………18
P5 Design a networked system to meet a given specification………………….
P6 Test and evaluate the design to meet the requirements and analyze user feedback………………
P7 Implement a networked system based on a prepared design………………
P8 Document and analyze test results against expected results………………
References…………………………………………………………………………. 19
P1 Discuss the benefits and constraints of different network types and standards.
- Local Area Network (LAN):
 A local area network (LAN) is made up of many computers and devices that share a common
communications line or a wireless link with the server in a separate geographic area. [1]
[2]

 Benefit of LAN:
 Resource Sharing: The LAN allows us to share resources such as computer resources like
printer, DVD-ROMs, modems and hard drives which can be shared on connected devices to help
us cut costs and hardware purchases.
 Software Applications Sharing: In the local network, it is easy to use the same software on
several computers connected to the network instead of buying software under a separate license
for each client on the network.
 Easy and Cheap Communication: Data and messages can be easily shared with other
computers on the network.
 Centralized Data: The data of all network users can be stored on the hard drive of the central
computer, server. This helps users to use any computer on the network to access the necessary
data.
 Data Security: The data is stored on the server computer, so it's easier to manage the data in
one place and the data will be more secure.
 Internet Sharing: Local area networks provide the ability to share a single Internet connection
among all users on the local network.

 Constraints of LAN:
 High Setup Cost: The initial configuration cost for installing LANs is high because special
software is required to create the server and communication devices such as Ethernet cables, switches,
hubs, routers and cables are expensive.
 Privacy Violations: LAN administrators can view and verify the personal data files of each LAN
user. In addition, it is possible to view the computer and Internet history of LAN users.
 Data Security Threat: Unauthorized users can access important office or campus data if the
server hard drive is not properly secured by the LAN administrator.
 LAN Maintenance Job: The local network requires a LAN administrator due to problems such
as software installation, program errors, or hardware or cable interference in the local network. A LAN
administrator is required to handle these problems.
 Covers Limited Area: Local networks are limited in size, covering a small area such as an office,
a building or a group of buildings nearby. [3]

- Wide Area Network (WAN):


 A wide area network (WAN) is a network that exists over a large geographical area
 A WAN connects different smaller networks, including local area networks (LANs) and metro
area networks (MANs). [4]

. [5]
 Benefits of WAN:
 Faster file accessibility: Because of caching, a person who uses the same file multiple times will
be able to access it faster because it is enough to save and retrieve new data, instead of having to reload
the entire document.
 Increased speed between multiple office locations: WAN solutions maximize network speed
between remote websites, speed up file transfer and network communications, such as email.
 Improved performance of "non-affected" applications: Applications that are not directly
affected by optimization solutions that seem to work easier or faster because the bandwidth previously
used for other processes can now be reserved for operations. unchanged.
 More reliable and faster data recovery: Faulty servers and applications can take a long time to
recover. The ability to optimize to increase network response time allows users to quickly regain access
to important applications, thereby increasing productivity.
 Constraints of WAN:
 Security problems: WAN has more security concerns than MAN and LAN. WAN has many
technologies combined, which can create a security breach.
 Needs firewall and antivirus software: Since data transmitted over the Internet can be
accessed and modified by hackers, the firewall must be activated on the computer. Some people may
also inject viruses into their computers to install antivirus software. Other security software must also be
installed on different points of the wide area network.
 The setup cost is high: Setting up WAN for the first time in offices has a higher cost. This may
involve purchasing additional routers, switches, and security software. [6]

- Metropolitan Area Network (MAN):


 A metropolitan area network (MAN) is similar to the local network but covers the entire city or
campus. [7]

[8]

 Benefits of MAN:
 Less Expensive: It is cheaper to force MAN with LAN. MAN gives you good data efficiency. All
data on MAN is easily managed centrally.
 Sending local emails: You can send local emails fast and free on MAN.
 High speed than WAN: Data rates can easily reach 1000 Mbps because MAN uses optical fiber.
Fast file and database transfer speeds.
 Sharing of the internet: With the installation of MAN, users can share their Internet connection.
In this way, many users can get the same broadband Internet.
 High Security: MAN’s has a high-security level than WAN.
 Constraints of MAN:
 Difficult to manage: It is difficult to manage if the size and number of local networks increases.
This is due to additional security and configuration issues.
 Internet speed difference: Because it cannot work on the copper wire of the phone. Copper wire
affects the speed of MAN. Therefore, a high cost is necessary for fiber optic cables.
 Hackers attack: In this network, there is a high risk of hacker attack compared to the LAN.
Therefore, the data may be leaking. Highly secure personnel are in demand at MAN.
 Technical staff requires to set up: Highly technical people require to setup MAN. The technical
people are network administrators and troubleshooters.
 Need More wires: In MAN more than LAN network, cables require. As you know, it is a
combination of two LANs. [9]

- Wireless LAN (WLAN).


 Wireless LANs (WLANs) are wireless computer networks that use high-frequency radio waves
instead of cables for connecting the devices within a limited area forming LAN (Local Area
Network). Users connected by wireless LANs can move around within this limited area such as
home, school, campus, office building, railway platform, etc. [10]

[11]

 Benefits of WLAN:
 Light of sight is not required for propagation.
 The signal is not blocked by any objects like buildings, trees etc.
 High data rate, as coverage area is small.
 Reliable type of communication.
 Economical for a small area access.
 Wireless transmission provides great flexibility.
 Constraints of WLAN:
 This communication is very prone to interference and noise.
 It has limited coverage area.
 Communication is not very secure and unauthorized access is common.
 License is required. [12]

- Storage Area Network (SAN):


 A Storage Area Network (SAN) is a combination of technologies that work together to create a
dedicated network layer that multiple servers can access.
 A SAN presents storage devices to a host such that the storage appears to be locally attached.
This simplified presentation of storage to a host is accomplished through the use of different types
of virtualization. [13]

[14]
P2 Explain the impact of network topology, communication and bandwidth requirements.
- Networking Topologies:
 Bus: All devices are connected to a common cable as a tree-truck, operates in daisy chain
fashion, medium is shared that’s why creates collision.

 Advantages:

- It will work well if you have a small network.


- This is a simple network topology for connecting computers.
- It requires less cable length than a star topology.
-
 Disadvantages:

- Difficult to solve the problem if the network is down.


- Very difficult to solve the problems of individual devices.
- The bus network structure is not ideal for large networks.
- If the main cable is damaged, the network will be damaged or split.

 Star: In the star network, the devices are connected to a central computer, called a hub.
Nodes communicate by transmitting data through the center.

 Advantages:

- Easy to install, configure, manage and expand.


- Centralized management.
- Addition or removal of device does not affect the whole network.

 Disadvantages:

- Requires more cable.


- Failure of hub affects entire network.
- More Expensive.

 Ring: The local area network (LAN) has a topology is a ring. All nodes are connected in a
closed loop.
 Advantages:

- Reliable and offers greater speed.


- No collisions.
- Handles large volume of traffic.
 Disadvantages:

- More cabling is required compared to bus topology.


- One faulty device affects the entire network.
- Addition of devices affect network.

 Mesh: In networks, devices are connected to multiple redundant connections between nodes
in the network. In an actual mesh topology, each node is connected to all other nodes in the
network.

 Advantages:

- Improves fault tolerance.


- Failure of one link does not affect entire network.
- Centralized management is not.
-
 Disadvantages:

- Difficult to install and manage.


- Each link from one device to other requires individual NIC.
- Expensive.

 Tree: It is a hybrid topology that combines the characteristics of linear topologies and linear
Bus. In a tree network, the star-configured network groups are connected to the main linear network
cable.

 Advantages:

- Easy to expand the network.


- Point-to-point wiring for each device.
- Fault detection is easy.

 Disadvantages:
- Difficult to configure.
- If backbone breaks, entire network goes down.
- More expensive.

 Hybrid: Hybrid topology that combines characteristics of linear bus and star topologies. In a
hybrid network, groups of star-configured networks are connected to a linear bus backbone cable.

 Advantages:

- Used for creating larger networks.


- Handles large volume of traffic.
- Fault detection is easy.

 Disadvantages:

- Installation and configuration is difficult.


- More expensive than other topologies.
- More cabling is required.
[15]

[16]

- The impact of current network technology, communication and standards:


 OSPF: It is a routing protocol generally used for larger network either a single network or a
group network. It is designed by Internet Engineering Task Force. It can also use as a Gateway
Protocol.
 FTP: File Transfer Protocol (FTP) is mainly a standard protocol of Network which is used to
transfer data from client to host or one server to another server. If user or admin want to upload
a file on a website he or she needs a username, password and host address.
 SMTP: Simple mail transfer protocol is like a media which transfers e-mail. SMTP always
work with POP3 service.
 TCP/IP: Transmission Control Protocol and Internet Protocol is a set of a protocol stack.
Basically it is tow different protocol. TCP/IP is closely related with FTP, SMTP, HTTP.
 Data communications:
 Transmission of signals.
 Send and receive information over communications lines.
 Encoding, interfacing, signal integrity, multiplexing etc.
 Networking:
 Topology & architecture used to interconnect device.
 Networks of communication systems.

 Bandwidth:
 Bandwidth is the capacity of a wired or wireless network communications link to
transmit the maximum amount of data from one point to another over a computer network or
internet connection in a given amount of time -- usually one second. Synonymous with capacity,
bandwidth describes the data transfer rate. Bandwidth is not a measure of network speed -- a
common misconception.
 Expected average load; anticipated peak load; local internet availability; cost
constraints, throughput.
 The impact of network bandwidth requirements:
 Bandwidth affects how long it takes to download or upload information over the
Internet. A connection that has plenty of bandwidth available provides a smooth, responsive
user experience. The more available bandwidth, the more quickly data can be transferred;
however, the law of diminishing returns applies here. Once you have sufficient bandwidth,
Internet performance is not further affected.

P3 Discuss the operating principles of networking devices and server types.


- Networking devices:
 Servers;
 Hub, routers;
 Switches;
 Multilayer switch, firewall, HIDS, repeaters;
 Bridges;
 Wireless devices;
 Access point (wireless/wired), content filter, load balancer, modem, packet shaper, VPN
concentrator.
 Hub:
- Simplest and low cost device.
- Also known as Multi-port Repeater.
- Operates at Physical Layer like Repeater.
- Transfers data to all the ports.

Operation of Hub

 Routers:
- Operate at Network Layer of the OSI model.
- Can connect nearer or far network segments.

Operation of Routers
[17]

Switches:
- Provide signal flow management.
- Replace slower hub.
- Being a Data Link Layer device uses MAC address for data transfer.
- Data transfer to specific port.

Operation of Switch:

[18]
- Server types:
 Web;
 File;
 Mail;
 Database;
 Virtualization;

The operating principles of server types:


- Web: A web server provides static content to a web browser by downloading files from a disk
and transmitting them to the user's web browser. All this exchange is done via HTTP.
- File: File servers store and distribute files, clients and users can share files stored on a server.
- Mail: Mail server popular and important such as web server, mail servers move and store mail on
corporate networks and the Internet.
- Database: Much of the data used by businesses, users and other services is stored in databases.
The database must be accessible to many customers at all times and requires significant disk
space.
- Virtualization: Virtual servers are the fever of the world, virtual server only exists as defined in
the specialized software called Hypervisor. Each hypervisor can run hundreds or thousands of
virtual servers at the same time. The virtual server uses the virtual hardware as usual and the
hypervisor convert the actual storage and computation into the actual hardware below, shared
among other virtual servers. [19]

P4 Discuss the inter-dependence of workstation hardware with relevant networking software.


 A workstation is a computer specially designed for scientific or technical applications and
designed mainly to be used by only one person at a time, usually connected to a working local area
network and multi-user operating system.
- The inter-dependence of workstation hardware with relevant networking software:
 The workstation is a computer designed to be used individually and to outperform a personal
computer. Because they are PC, they can be used independently of mainframes assuming they
have their own applications installed and stored their own hard drives.
 The inter-dependence of workstation hardware with relevant networking software:
 A network interface card is a piece of computer hardware that groups computers into a
network, usually a local area network. Networked computers always communicate with each
other using the specified protocol to transmit data packets. The network interface card acts as a
translator allowing the machine to send and retrieve data from each other on the local network.
[20]

P5 Design a networked system to meet a given specification.


First floor: Including Main server and Staff.
Second floor.

Third floor.
P6 Test and evaluate the design to meet the requirements and analyze user feedback.
- Performance test:
 Performance testing is the process determining the speed, the ability to meet and stability of
computer, network, software or equipment will perform well under their expected workload.
 Features and Functionality supported by a software system is not the only concern. A
software application's performance like its response time, reliability, resource usage, and
scalability do matter. The goal of Performance Testing is not to find bugs but to eliminate
performance bottlenecks.
 Seven performance testing steps:
 Identify the testing environment: Identify the hardware, software, network configurations
and tools available allows the test team to design the test and identify performance test
challenges from the start.( Time for this test about 10 minutes ).
 Identify performance metrics: In addition to identifying metrics such as response time,
throughput, and constraints, identify the criteria for successful performance testing.
( Time for this test about 15 minutes).
 Plan and design performance tests: Identify performance test scenarios that take into
account user variability, test data, and target metrics. This will create one or two models.
( Time for this test about 20 minutes).
 Configure the test environment: Prepare the elements of the test environment and the
necessary instruments to monitor the resources. ( Time for this test about 10 minutes).
 Implement your test design: Develop the tests. ( Time for this test about 15 minutes).
 Execute tests: In addition to running performance tests, monitor and capture the data
generated. ( Time for this test about 15 minutes).
 Analyze, report, retest: Analyze the data and share the results. Rerun the performance
tests using the same and different parameters. ( Time for this test about 30 minutes).
 At last, performance testing takes 115 minutes. [21]

- Stress test:
 Stress testing is a procedure to determine whether a computer, an application, a device, or
the entire network can withstand high loads and still work. A stress test can be a simulation of an
unfavorable condition destroying a system or at least reducing its performance.
 Stress Testing process can be done in 5 steps:
 Planning the Stress Test: Here you collect system data, analyze the system, define the
objectives of the stress test. ( Time for this test about 15 minutes).
 Create Automation Scripts: In this phase, you create the stress test automation scripts,
generate the test data for the stress scenarios. ( Time for this test about 20 minutes).
 Script Execution: In this step, you run the stress test automation scripts and store the
stress results. ( Time for this test about 10 minutes).
 Results Analysis: In this step, you analyze the results of the stress tests and identify the
bottlenecks. ( Time for this test about 5 minutes).
 Tweaking and Optimization: In this step, you refine the system, modify the configurations,
optimize the code with the objective of reaching the desired benchmark. ( Time for this test
about 10 minutes).
 In conclusion, stress testing takes 60 minutes. [22]

- Failure test:
 Failure testing is very important part of the production process. Failure tests are one way to
ensure that you produce a product and service that does not fail in adverse situations.
Continuous failure testing, even after product development, will help you ensure that your
production process is as optimal as possible and that you are improving your product or service.
 Failure testing have 3 parts:
 Step 1: Data collection.
 The first step in a root cause failure analysis is data collection. I will collect information
about how the device failed and when it happened.
 During this phase, I will carry out tests on the product analyzed. It is common to test a
representative sample of faulty devices as well as those that work properly. This can help
determine which components are failing and when the failure occurs. ( Time for this test about
10 minutes).
 Step 2: Analyze Data Collected to Determine Root Cause Failure.
 The next step in the failure analysis process is to determine the root cause of the failure.
Device failure is rarely the result of a single incident. ( Time for this test about 15 minutes).

 Step 3: Determining Corrective Actions.


 Determining corrective actions is the most important part of a root cause failure analysis.
 Many recommendations for correcting a problem are small changes that can have a
significant impact. Small changes in the way source materials and product components are
tested, processed and stored can significantly reduce device failure. ( Time for this test about 20
minutes).
 Finally, Failure testing takes 45 minutes.
 Failure analysis tests: Root cause failure analysis uses a variety of tests to determine the
true source of a product failure. These tests are divided into two categories: non-destructive
tests, which keep a product intact; and destructive testing, which requires modification of the
product to examine cross-sections or thermal behavior. [23]

P7 Implement a networked system based on a prepared design.

ASM1,2 Networking.pkt

P8 Document and analyze test results against expected results.


- Performance test.
 I will access random computer, choose desktop and press Command Prompt.

 Then I will enter the ping command on a computer that has a specific IP address. It’s like a way
of transferring data between devices and helps me know if the connection is good.
 I try to ping 192.168.3.15 and I have the result below.
References
[1] SearchNetworking. (2019). What is a LAN? - Definition from WhatIs.com. [online] Available at:
https://searchnetworking.techtarget.com/definition/local-area-network-LAN [Accessed 25 Nov. 2019].
[2] Cascade Business News. (2019). The Pros and Cons of Local Area Network (LAN) - Cascade Business
News. [online] Available at: http://cascadebusnews.com/pros-cons-local-area-network-lan/ [Accessed
24 Nov. 2019].
[3] Computer Network Topology. (2019). Local Area Network | Advantages and Disadvantages of LAN
(2019). [online] Available at: https://computernetworktopology.com/local-area-network/ [Accessed 22
Dec. 2019].
[4] Techopedia.com. (2019). What is a Wide Area Network (WAN)? - Definition from Techopedia. [online]
Available at: https://www.techopedia.com/definition/5409/wide-area-network-wan [Accessed 25 Nov.
2019].
[5] Study-ccna.com. (2019). Wide area network. [online] Available at: https://study-ccna.com/wide-
area-network/ [Accessed 24 Nov. 2019].
[6] (WAN), A., Rehman, J. and Rehman, J. (2019). Advantages and disadvantages of wide area network
(WAN). [online] IT Release. Available at: http://www.itrelease.com/2018/07/advantages-and-
disadvantages-of-wide-area-network-wan/ [Accessed 22 Dec. 2019].
[7] Techopedia.com. (2019). What is Metropolitan Area Network (MAN)? - Definition from Techopedia.
[online] Available at: https://www.techopedia.com/definition/8238/metropolitan-area-network-man
[Accessed 25 Nov. 2019].
[8] Computer Networking. (2019). Metropolitan Area Network (MAN). [online] Available at:
http://computernetworkingtopics.weebly.com/metropolitan-area-network-man.html [Accessed 24 Nov.
2019].
[9] Am7s. (2019). What is MAN Network?Advantages and disadvantages of MAN-Am7s. [online]
Available at: https://www.am7s.com/what-is-man-network-advantages/ [Accessed 22 Dec. 2019].
[10] Tutorialspoint.com. (2019). What are wireless LANs?. [online] Available at:
https://www.tutorialspoint.com/what-are-wireless-lans [Accessed 25 Nov. 2019].
[11] Abodeservices.tradeindia.com. (2019). Wireless LAN Solution - Wireless LAN Solution Provider from
Virar,Supplier,Trader,Maharashtra, India. [online] Available at:
https://abodeservices.tradeindia.com/wireless-lan-solution-3989343.html [Accessed 24 Nov. 2019].
[12] Sharma, K. (2019). WLAN with its Advantages and Disadvantages. [online] OurEducation. Available
at: https://blog.oureducation.in/wlan-advantages-disadvantages/ [Accessed 22 Dec. 2019].
[13] Snia.org. (2019). What Is a Storage Area Network (SAN)? | SNIA. [online] Available at:
https://www.snia.org/education/storage_networking_primer/san/what_san [Accessed 25 Nov. 2019].
[14] Networksandservers.blogspot.com. (2019). <h1>High Availability Storage (II)</h1>. [online]
Available at: https://networksandservers.blogspot.com/2011/09/high-availability-storage-ii.html
[Accessed 24 Nov. 2019].
[15] Anon, (2019). [online] Available at: https://www.webopedia.com/quick_ref/topologies.asp
[Accessed 27 Nov. 2019].
[16] DNSstuff. (2019). What is Network Topology? Best Guide to Types & Diagrams - DNSstuff. [online]
Available at: https://www.dnsstuff.com/what-is-network-topology [Accessed 1 Dec. 2019].
[17] Gupta, A. (2019). What is Router in Networking | How Router works and its functions. [online]
Learnabhi.com. Available at: https://www.learnabhi.com/router-computer-network/ [Accessed 1 Dec.
2019].
[18] Yourownlinux.com. (2019). NETWORK SWITCH : Purpose and Functions. [online] Available at:
http://www.yourownlinux.com/2013/07/network-switch-purpose-and-functions.html [Accessed 1 Dec.
2019].
[19] Paessler.com. (2019). Server - Definition and Details. [online] Available at:
https://www.paessler.com/it-explained/server [Accessed 1 Dec. 2019].
[20] Australia, A., Brisbane, A., Melbourne, A., Perth, A., Sydney, A., Canada, A., Singapore, A., Malaysia,
A., help, A., help, C., help, E., help, E., help, F., help, H., help, M., help, M., help, N., help, S. and help, S.
(2019). (Solved) - Discuss the interdependence of workstation hardware with relevant... | Transtutors.
[online] Transtutors.com. Available at: https://www.transtutors.com/questions/discuss-the-
interdependence-of-workstation-hardware-with-relevant-networking-softwar-2824686.htm [Accessed
22 Dec. 2019].
[21] Stackify. (2019). Performance Testing Types, Steps, Best Practices, and Metrics. [online] Available at:
https://stackify.com/ultimate-guide-performance-testing-and-software-testing/ [Accessed 25 Dec.
2019].
[22] Guru99.com. (2019). What is STRESS Testing in Software Testing? Tools, Types, Examples. [online]
Available at: https://www.guru99.com/stress-testing-tutorial.html#2 [Accessed 25 Dec. 2019].
[23] National Technical Systems. (2019). Failure Analysis - Root Cause Failure Analysis | NTS. [online]
Available at: https://www.nts.com/services/testing/failure-analysis/ [Accessed 25 Dec. 2019].

You might also like