Download Prince Mohammad Bin Fahd University Network Management

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Peering wikipedia , lookup

Deep packet inspection wikipedia , lookup

Net neutrality law wikipedia , lookup

IEEE 1355 wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Policies promoting wireless broadband in the United States wikipedia , lookup

Net bias wikipedia , lookup

Computer security wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Distributed firewall wikipedia , lookup

Computer network wikipedia , lookup

Wireless security wikipedia , lookup

Network tap wikipedia , lookup

Airborne Networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Transcript
Prince Mohammad Bin Fahd University
Network Management Project
SNC-Lavalin Fayez Engineering Company
Course Instructor:
Ms. Wesal Mohamed Ali
Course information:
Network Management ITAP2431
Section: 201
Group members:
Hajir Abu-Khamsin 200900598
Fatima Al-saffar 200800488
Batool Al-Muslim 200800541
Fatima Al-sehaty
Marwa Al-Humood
Introduction:
On Sunday 2/12/2012 we went to SNC-Lavalin Fayez Engineering Company to write a
report about the company’s infrastructure and network. SNV-Lavlin is one of the leading
engineering and construction groups in the world and has offices across Canada and in other 40
countries around the world. SNC-Lavalin Fayez Engineering Company is engineering consultancy
joint venture between SNC-Lavin and its local partners, recently the industrial division of Zuhair
Fayez Partnered with the company. SLFE was formed partly in response to Saudi Aramco’s
General Engineering service Plus initiative which aimed to develop engineering capabilities in
the kingdom. Under this initiative SLFE will be invite to bit on front-end engineering and select
detailed engineering services constricts to support the implementation of Saudi Aramco’s
capital program. Projects will include both on and offshore oil and gas production and
processing facilities infrastructure projects, as well as refining and petrochemical facilities.
Network infrastructure:
The company as mentioned above provides different consulting and designs to different
companies such as Aramco and SATROP, thus it shares its servers with them. The company has
eight floors and in total contains 600 computers connected in server-client connection. All the
computers of each floor are connected together using switches then the floors are connected
together using primary and secondary fiber optic cables This difference between secondary and
primary fiber optics is that the first one is the main cable they relay on and the other one acts
as a back up. A UTP/ copper caber link is also used in this network this cable is short for
unshielded copper cable link that is a cable made of pairs of copper wires that are twisted
around each other it is commonly used for the purposes of canceling out electromagnetic
interference from external sources. UTP cables are found in many Ethernet networks and
telephone systems. The switches also included access points to the Nortel WLAN. We’ve have
been talking previously about Nortel access points this is because in the company they use
Nortel Ethernet for the wireless communication in (WLAN), this technology is discussed in
details later on in this report.
All of the 600 computers are connected together to the network and internet servers in
the main floor using also the primary and secondary optics cables. They also have an IP Tel
switch in the main communication room which is connected to all the servers, floor switches,
Juniber firewall and the secure router using UTP/copper cable link. The IP Telephony uses the
internet protocol (IP) to transmit voice or fax traffic over privet or public data network, to
ensure high quality voice communications IP Tel also called voice over IP requires sufficient
bandwidth to ensure transmission delay is minimized. IP Tell capability can provide significant
cost saving to businesses with branch locations by eliminating the need for long distance
charges or by reducing the number of local access line required by the business. It can be
integrated into other solutions like unified messaging to provide enhanced saving and service
levels to companies using the internet for commerce or service application. Thus, this
technology brings a lot of benefits to AL-Fayez Company since they have offshore servers and
are connected with many different networks in the region.
We must also distinguish the difference between a switch and a router although many
might think they do the same job but they are different. A network switch is a small hardware
device that joins multiple computers together within one local area network (LAN). Technically,
network switches operate at layer two (Data Link Layer) of the OSI model. On the other hand, a
router is a device that forwards data packets along networks. A router is connected to at least
two networks, commonly two LANs or WANs or a LAN and its ISPs network. Routers are located
at gateways, the places where two or more networks connect.
AL-fayez company network is connected to another two networks in each network we
can see that all of the floors commuters are connected using switch. SATROP in specific uses
primary and secondary fiber optic cables to link between the switches they are connected to a
core switch, a secure router and a Juniber firewall those three components are connected
together using UTP/Copper cable link. As for Saudi Aramco network the switches are connected
together using only primary fiber link they are connected to secure router and a switch using
UTP/Copper cable link.
Internet Service Providers (ISPs):
It can be defined as the connecting customers, whether companies or individuals-Internet
through data DSP service providers licensed by the communications and information technology
Commission. Or it can be defined as the company that provides its customers with access to the
Internet. And associated Internet service provider to its customers using a data transmission
technology appropriate for delivering Internet data packages, such as dial-up, digital subscriber
line (DSL), cable modem, wireless, ad hoc link high speed Internet service provider may provide
e-mail accounts to users which allow them to communicate with each other by sending and
receiving electronic messages through server (server) ISP (as part of the e-mail service is usually
not save the user's ISP and e-mail client software package, developed either internally or
Through an external contract arrangement). Internet service providers can offer us other services
such as remote data storage on behalf of their customers, as well as other services unique to each
ISP.
Some examples of Internet service providers (ISPs) in our country KSA:
Company name
City
Website
Sahara network commercial
Al-Dammam
www.sahara.com.sa
Saudi net
Al-Riyadh
www.saudi.net.sa
Etihad Etisalat (Mobile)
Al-Riyadh
www.mobily.com.sa
Island Foundation
How to choose an ISP:
One of the most difficult questions facing the Internet user: Is there an appropriate service
provider for me and for my needs? There are a number of criteria that are building them chose
Internet service provider both at the level of the home user interested get a link for Web
browsing and e-mail or user at the level of companies or organizations that have their own
websites and may run some online business, the most important of these criteria the number of
different Internet connections required, prices and other variables. There are currently 20
companies with Kingdom of Internet services, and that number is expected to increase over the
coming years.
Ways to connect to the Internet:
To connect computers to the Internet must connect this computer to another computer connected
to the Internet permanently as a main institution or college computer service provider contact
your ISP, and can connect to the Internet in two ways:
1.
Technical

Dial-up

By direct contact Direct-Connection.
2. Through wireless technology
All the methods above required an Internet Service Providers to connect to the Internet, without
these services we cannot browse the Internet.
Servers:
The company has three email servers; one is inside the local network of the company which is
connected to the Juniper firewall. The other is in Jeddah which is connected to the company
through VPN connection with an additional STC connection as a backup; the third server is
located in Jakarta also through VPN connection. A virtual private network (VPN) extends a
private network and the resources contained in the network across public networks like the
Internet. It enables a host computer to send and receive data across shared or public networks
as if it were a private network with all the functionality, security and management policies of
the private network. This is done by establishing a virtual point-to-point connection through the
use of dedicated connections, encryption, or a combination of the two. The VPN connection
across the Internet is technically a wide area network (WAN) link between the sites but appears
to the user as a private network link.
In the company they have other different servers they have different types of servers
which are HP DL 380, HP DL 380DC 1 and HP DL 380 Cluster. The HP DL 380 is Exchanger Server.
It is a mail server, calendaring software and contact manager developed by Microsoft. It is a
server program that runs on Windows Server and is part of the Microsoft Servers line of
products. The HP DL 380 DC 1 called Domain controller, it is a server on a Microsoft Windows
that is responsible for allowing host access to Windows domain resources. The cluster alias acts
as a single network node identifier for an OpenVMS Cluster system. Computers in the cluster
can use the alias for communications with other computers in a DEC net network. Note that it is
possible for nodes running DEC net for OpenVMS to have a unique and separate cluster alias
from nodes running DEC net--Plus. In addition, clusters running DEC net--Plus can have one
cluster alias for VAX, one for Alpha, and another for both. The protocols that company used are
LAN and WAN. LAN is a local area network, which is computer network that interconnects
computers in a limited area.WAN is a wide area network, which is a network covers abroad
area.
Backbone
Backbone interconnects various pieces of network, providing a path for the exchange of
information between different LANs. A backbone can tie together diverse networks in the same
building, in different buildings or over wide areas. Normally, the backbone's capacity is greater
than the networks connected to it. It uses high speed circuits to connect LANs and provide
connections to other backbones, MANs and WANs. The company use collapsed Ethernet
backbones. The advantage of collapsed Backbone is improved performance and it is simpler
more easily managed network.
Collapsed Backbone:
The Ethernet is a type of architecture used in many local area networks (LANs). It sets of
protocols which serves the physical and data link layers. It utilizes a linear bus or star topology.
Also, it served as the basis for the IEEE 802.3 standard. Ethernet was commercially introduced
in 1980. It has largely replaced competing wired LAN technologies. Ethernet networking is the
most common physical networking standard. It supports TCP/IP networking seamlessly, and
provides an inexpensive, simple, high bandwidth method for interconnection of local computers.
The Ethernet standards comprise several wiring and signaling variants of the OSI physical layer
in use with Ethernet. Systems communicating over Ethernet divide a stream of data into shorter
pieces called frames. Each frame contains source and destination addresses and error checking
data so that damaged data can be detected and retransmitted. Ethernet cables known as RJ-45
cables, they are used in computer networking and deliver data between computers on the
Internet. Ethernet cables are the major pipeline of your home and office network. Ethernet cables
connect network devices such as modems, routers, and adapters. They transmit data using the
Ethernet protocol. Networking devices feed Internet data through the Ethernet cables which
connect to a network port on your computer. In addition, each computer that requires a high
speed Internet connection must be connected to an Ethernet cable. Furthermore, if you set up a
wireless router at home, an Ethernet cable is still needed to feed the wireless antennas an Internet
connection. There are three ways that make the data Travels over the Ethernet Cable.
First, full duplex which the data can travels both directions at once. Second, half
duplex which the data can only travels one direction at any instant. This is slower than full
duplex. Third, Auto-negociation is when the network devices figure out whether both on either
end of an Ethernet cable are full duplex.
WLAN:
WLAN stands for wireless LANs, usually companies do not use wired LANS actually 90% of
company’s uses wireless LANS. A wireless local-area network (LAN) uses radio waves to
connect devices such as laptops to the Internet and to your business network and its applications.
When you connect a laptop to a WiFi hotspot at a cafe or other public place, you're connecting to
that business's wireless network. In the past, some believed wired networks were faster and more
secure than wireless networks. But continual enhancements to wireless networking standards and
technologies have eroded those speed and security differences. The company they use Nortel
wireless technology, Nortel Networks Corporation, formerly known as Northern Telecom
Limited and sometimes known simply as Nortel, was a multinational telecommunications
equipment manufacturer headquartered in Mississauga, Ontario, Canada. It was founded in
Montreal. A wireless network can open up a whole new world of opportunities and extend access
to information for their company well beyond the traditional confines of a PC tethered to a power
outlet and Ethernet connection.
Benefits:
-
Convenience. Access your network resources from any location within your wireless
network's coverage area or from any WiFi hotspot.
-
Mobility, you’re no longer tied to your desk, as you were with a wired connection. You
and your employees can go online in conference room meetings, for example.
-
Productivity, Wireless access to the Internet and to your company's key applications and
resources helps your staff get the job done and encourages collaboration.
-
Easy setup, You don't have to string cables, so installation can be quick and cost-effective.
-
Expandable, You can easily expand wireless networks with existing equipment, while a
wired network might require additional wiring.
Components of WLAN:
1- Access point:
(APs or WAPs) are specially configured nodes on wireless local area networks
(WLANs). Access points act as a central transmitter and receiver of WLAN radio signals.
2- Network Interface Cards: NIC, an expansion board you insert into a computer so the computer can be
connected to a network. Most NICs are designed for a particular type of network, protocol, and media,
although some can serve multiple networks.
3- Core switch: that is connecter wirly to the access point to provide the network
WLAN in the company:
In Alfayez Company they use WLANs to connect between the floors and the core switch. In each
floor we have two access points so in total of twelve access points are installed all of these
access points are connected to the core switch. The access point and the core switch are from
Nortel Ethernet Company.
Network topology
A network topology describes the arrangement of systems on a computer network. It defines how
the computers, or nodes, within the network are arranged and connected to each other. Network
topologies are categorized into the following basic types:

bus

star

tree

mesh
Moreover, topology can be physical or logical. Physical Topology is the physical layout
of nodes, workstations and cables in the network whereas logical topology is the way
information flows between different components. In general, physical topology relates to a core
network while logical topology relates to basic network.
The company told us that they used a bus networks topology, which is the simplest way
that uses a common backbone to connect all devices. A bus topology connects each computer
(nodes) to a single segment trunk (a communication line, typically coax cable that is referred to
as the 'bus'. The signal travels from one end of the bus to the other. This allows only one device
to transmit at a time but may have problems when two clients want to transmit at the same time
on the same bus. However, bus networks work best with a limited number of devices. If more
than a few dozen computers are added to a network bus, performance problems will likely result.
In addition, if the backbone cable fails, the entire network effectively becomes unusable.
The company used bus networks topology for the following advantages:

Bus is easy to use and understand and inexpensive simple network. It is easy to extend a
network by adding cable with a repeater that boosts the signal and allows it to travel a
longer distance.

Allows relatively high rate of data transmitting

Well suited for temporary networks that must be set up in a hurry

Failure of one of the station does not affect others
Nevertheless, bus networks topology have the following disadvantages that may
affect on the performance of the company:

A bus topology becomes slow by heavy network traffic with a lot of computer because
networks do not coordinate with each other to reserve times to transmit. It is difficult to
troubleshoot a bus because a cable break or loose connector will cause reflections and
bring down the whole network.

It requires a network to detect when two nodes are transmitting at the same time

Its maintenance cost may be higher in the long run and the performance degrade as
additional computers are added.
Although the company told us that they are using bus topology, we are recommended that
they use star topology since they use collapsed backbone and it is better to use star topology with
collapsed backbone. In the star topology there is a central connection point called the hub, which
is a computer hub or sometimes just a switch. In a Star Network, the best advantage is when
there is a failure in cable then only one computer might get affected and not the entire network.
In a Star Network, the entire network is dependent on the hub so if the entire network is not
working then there could be a problem with the hub. This feature makes it easy to troubleshoot
by offering a single point for error connection and at the same time, the dependency is also very
high on that single point.
Backup
Ba
cking-up
is
a
crucial process that each company must do in order to have a fail-safe, for when the inevitable
happens. The main purpose of back up is to make copies of particular data in order to use those
copies for restoring the information in case of equipment failure occurs or other catastrophe (a
data loss event due to deletion, corruption, theft, viruses etc.). Each company has its own
approach in executing the backup but there are four common backup types implemented and
generally used in most business company which are; full backup, differential backup,
incremental backup and mirror backup.
We approach the company and they said that the company has its own Server Backup
Procedure
Every business day, data backup must be performed on each server
These are:
Daily backup (ex. Monday to Thursday for most offices)
At the end of each business day, differential or incremental backups must be performed. These
backups will be retained for a period of 14 days. The company used these types as a daily backup
because both differential and incremental backups are "smart" backups that save time and disk
space by only backing up changed files. However, they differ significantly in how they do it, and
how useful the result is.
Weekly backup (ex. Friday for most offices) the last business day of the week, a full backup
of all servers must be performed. These backups will be retained for a period of 15 weeks.
Quarterly backup:
The company said that on the first weekend of April, July and October, two full backups must be
performed. The first full backup (weekly) will be retained for a period of 15 weeks. The second
full backup, which is the “Quarterly”, will be retained for at least one year.
Yearly backup:
The company said that on the first weekend of January; two full backups must be performed. The
first full backup, which is (weekly backup), will be retained for a period of 15 weeks. The second
full backup, which is the (yearly backup), will be retained for at least one year.
Backup tape storage
The IT administrator said,” If it is not possible to store the tapes offsite, they should at
least be kept in a secured place, other than the servers’ room.” In computing, off-site data
protection is the strategy of sending critical data out of the main location (off the main site) as
part of a disaster recovery plan. Data is usually transported off-site using removable storage
media such as magnetic tape or optical storage.” The company does backup the system on daily
base and D 2 D (disc to disc) backup. With D2D, a computer hard disk is backed up to another
hard disk rather than to a tape or floppy. D2D is often confused with virtual tape, but differs in
that it enables multiple backup and recovery operations to simultaneously access the disk directly
by using a true file system.
Network strength and weaknesses:
As for every network there is always strength and weaknesses to them and here is a list
of strength and weaknesses that we have found in the company.
Strength:
1- The type of cabling used in this company is extraordinary. It Is very clear that they spent
a lot of money on it since they use primary and secondary fiber optic cables to connect
between the floors and this is not usual in companies to use fiber optics to connect
between floors. They also used UTP/C cables which are also a very high quality cables.
They didn’t use any cheap cables such as twisted pair cables which defiantly a plus to
the company.
2- The company uses WLAN instead of usual wired LAN which is Of course a benefit to the
company in terms of speed, convenient and expandability.
3- Security in the company is noticeably high since they use a very good back up system
and they use juniper switch and firewalls which provide secure network to the company.
4- The company doesn’t use hubs which are poor kind of connectivity devices instead they
use access points.
5- They use also Cisco backbone system and Nortel Ethernet technology which are very
known companies and are huge competitors in the market.
Weakness:
1- Although using fiber optic cables and UTP/C cables is a strength to the company it
can also be some kind of weakness since it is highly expensive and also if one of
them got corrupted or needed a replacement it surely going to be expansive.
2- The company only uses Bus topology which is a very huge disadvantage to the
company it would’ve been better to use another types of topology and this was
discussed in details in the topology part of the report.
3- The servers are stored in rooms that has windows and maybe it would be better to
not use windows to prevent sun of rain to come in the servers room and it would
provide better conditions to it.
Network cost:
The company spended ten million Saudi Reyals to install the network in the company.
Data transmission
Digital transmission is the sending of information over a physical communications media in the
form of digital signals. (a digital bit stream) over a point-to-point or point-to-multipoint
communication channel. Data transmission is a subset of the field of data communications,
which also includes computer networking or computer communication applications and
networking protocols. (erroneously decoded data from a transmitting station to a plurality of
receiving stations is performed, where retransmitted data is sent via at least one
communication channel, which is different from the one used for the initially transmitted data).
Examples of such channels are copper wires, optical fibers, wireless communication channels,
and storage media. The data are represented as an electromagnetic signal, such as an electrical
voltage, radio wave, microwave, or infrared signal. Is the company they rely on fiber optic
cables and UTP/C cables for transmitting data also transmit data wirelessly through the
Ethernet.
Types of Applications
In SLFE Company they rely on Microsoft SQL server and Microsoft Dynamics GP for applications.
Microsoft SQL Server, According to Internet market research and strategic consulting, continues
as the database used by the company. It is a standard programming language for retrieving
information from and updating databases and enables user to select, insert, update, and delete
data from database. It is a standard language that all commercial databases .The IT manager in
the company consultant to have a hands-on experience with SQL (as well as with any other
Information Technologies).
As for Microsoft Dynamics GP (formerly Great Plains) it is software that delivers comprehensive
out-of-the-box business management functionality, from operations management and financial
management to human resource management and manufacturing. It connects the many
moving parts of them organization, giving them better visibility into and control over what’s
going on them business. That increasing margins and improving them cash flow. Microsoft
Dynamics GP helps them to grow and manage them distribution business better through:
improve operational efficiency, save time, and reduce costs by transforming time-consuming
manual processes into automated tasks that can be executed quickly and accurately. Also
improved Visibility and Stronger Customer Service.
Communication network wireless
They use a wireless Ethernet bridge which converts a wired Ethernet device for use on a
wireless computer network. Wireless Ethernet bridges and USB adapters are both sometimes
called wireless media adapters as they enable devices for WiFi utilizing Ethernet or USB physical
media and they use 1GB of Ethernet .The company they use Nortel wireless technology, Nortel
Networks Corporation, formerly known as Northern Telecom Limited and sometimes known
simply as Nortel, was a multinational telecommunications equipment manufacturer
headquartered in Mississauga, Ontario, Canada. It was founded in Montreal. A wireless network
can open up a whole new world of opportunities and extend access to information for their
company well beyond the traditional confines of a PC tethered to a power outlet and Ethernet
connection.
Network security:
Network security involves the authorization of access to data in a network, which is controlled
by the network administrator. Users choose or are assigned an ID and password or other
authenticating information that allows them access to information and programs within their
authority. Network security involves the authorization of access to data in a network, which is
controlled by the network administrator. Users choose or are assigned an ID and password or
other authenticating information that allows them access to information and programs within
their authority. Network security involves all activities that organizations, enterprises, and
institutions undertake to protect the value and ongoing usability of assets and the integrity and
continuity of operations. An effective network security strategy requires identifying threats and
then choosing the most effective set of tools to combat them. Threats to network security
include: Viruses, Trojan horse programs, Vandals, Attacks. Network security helps your
company meet mandatory regulatory compliance. Because network security helps protect your
customers' data, it reduces the risk of legal action from data theft. Ultimately, network security
helps protect a business's reputation, which is one of its most important assets.
In AL-fayez Company they have a very good security system where they use a Nortel secure
router The Nortel Secure Router 3120 is a powerful modular system that converges routing,
security and multimedia traffic forwarding in a single cost-effective platform for enterprises.
Delivering fast, secure, reliable and scalable wide area network (WAN) access, the Secure
Router 3120 is perfect for enterprises requiring high-speed IP or Internet access. Based on a
simple-to-scale architecture, the Secure Router 3120 provides consistent wire-speed
throughput even with advanced services enabled. The Secure Router 3120 combines high
performance, robust routing and flexible WAN connectivity and is targeted at larger branch and
regional enterprise environments. A rich suite of routing services and advanced WAN
functionality makes the Secure Router 3120 ideal for high-speed Internet access, private line
WAN connectivity, IP Telephony and multimedia, IPsec VPN, stateful firewall or data backup
applications. Comprehensive, simple-to-use software tools enable sophisticated access and
bandwidth management for dependable communications.
They also use Juniper firewall system
Juniper is a vendor or manufacturer of Firewall
appliances. Juniper also manufactures and sells routers, switches, IDP/IDS devices and SSL-VPN
appliances.
A firewall is a set of related programs, located at a network gateway server that
protects the resources of a private network from users from other networks. (The term also
implies the security policy that is used with the programs.) An enterprise with an intranet that
allows its workers access to the wider Internet installs a firewall to prevent outsiders from
accessing its own private data resources and for controlling what outside resources its own
users have access to.
Surf control: to monitor internet activity
The company use Surf Control to monitor internet activity which offers a total content security solution
that combines Web and e-mail filtering technology with the industry's largest, most accurate and
relevant content database and adaptive reasoning tools to automate content recognition.
Surf Control's Internet monitoring and policy management solutions are flexible, saleable and
interoperable to meet the diverse needs of all its markets -- corporate, education, home and OEM. Surf
Control offers a choice of platform independent or integrated solutions, and the software can be
installed in any network environment.
Surf Control Web Filter provides Real-Time Monitoring, Reporting and Analysis, as well as Categorization
of URL Content to allow organizations to effectively manage their employees' Internet Usage – Surf
Control Web Filter is available as a stand-alone product for Windows NT & Windows 2000, or as an
integrated product into Microsoft Proxy Server, Microsoft ISA Server 2000, Novell Border Manager as
well as FireWall-1.
Surf Control E-mail Filter manages content security of all inbound, outbound and internal email
transmissions. Surf Control Email Filter allows for content rule definition in order to implement and
enforce an organization's Acceptable Use Policy (AUP).
Surf Control solutions Increase Employee Productivity, Increase Network Bandwidth, Reduce Legal
Liability, Protect Intellectual Property & Improve Security.
Screen shot of the device:
Conclusion :
SNV-Lavlin is one of the leading engineering and construction groups in the world and has
offices across Canada and in other 40 countries around the world. SNC-Lavalin Fayez
Engineering Company is engineering consultancy joint venture between SNC-Lavin and its local
partners. The company as mentioned above provides different consulting and designs to
different companies such as Aramco and SATROP, thus it shares its servers with them. and
there is a list of strength and weaknesses that we have found in the company.one of strength
that the security in the company is noticeably high since they use a very good back up system
and they use juniper switch and firewalls which provide secure network to the company. Also
they have good of application that they use such as Microsoft SQL server and Microsoft
Dynamics GP for applications.finally SLFE Company will improve the weakness in company .such
as will improve to use another types of topology and this was discussed in details in the
topology part of the report, The company only uses Bus topology which is a very huge
disadvantage to the company. Although they using fiber optic cables and UTP/C cables is a
strength to the company it can also be some kind of weakness since it is highly expensive and
also if one of them got corrupted or needed a replacement it surely going to be expansive.
Sources:
-
-
-
-
-
-
-
-
-
Virtual private network - Wikipedia, the free encyclopedia. (n.d.). Wikipedia, the free
encyclopedia. Retrieved December 14, 2012,
from http://en.wikipedia.org/wiki/Virtual_private_network
Bus Topology : Advantages and Disadvantages. (n.d.). I Answer 4 U. Retrieved
December 14, 2012, from http://www.ianswer4u.com/2011/05/bus-topologyadvantages-and.html#axzz2EYPQeHYP
Backup types. (n.d.). Backup Software - Protect your Data. Retrieved December 14,
2012, from http://www.backup4all.com/kb/backup-types-115.html
Mitchell, B. (n.d.). Network Topology - Types of Network Topologies - Bus, Ring and
Star. Networking - Computer and Wireless Networking Basics - Home Networks
Tutorials. Retrieved December 14, 2012,
from http://compnetworking.about.com/od/networkdesign/a/topologies.htm
Network Topology Tips :: Lahitech.com. (n.d.). Web Design and Development for
Internet and Intranet Websites :: LAHITECH Website. Retrieved December 14, 2012,
from http://www.lahitech.com/networktips.asp
Mesh Topology: Advantages and Disadvantages. (n.d.). I Answer 4 U. Retrieved
December 14, 2012, from http://www.ianswer4u.com/2011/05/mesh-topologyadvantages-and.html#axzz2Ev9nk36u
What Is a Wireless Network?: The Basics - Cisco Systems . (n.d.). Cisco Systems, Inc.
Retrieved December 14, 2012,
from http://www.cisco.com/cisco/web/solutions/small_business/resource_center/a
rticles/work_from_anywhere/what_is_a_wireless_network/index.html
Oranrigsupak, T. (n.d.). SQL by Theinchai Oranrigsupak. Home Page. Retrieved
December 14, 2012, from http://theinchai.tripod.com/SQL.htm
Supply Chain Management | Microsoft Dynamics GP (formerly Great Plains).
(n.d.). Microsoft Corporation. Retrieved December 14, 2012,
from http://www.microsoft.com/en-us/dynamics/erp-gp-overview.aspx
Mitchell, B. (n.d.). Wireless Ethernet Bridge. Networking - Computer and Wireless
Networking Basics - Home Networks Tutorials. Retrieved December 14, 2012,
from http://compnetworking.about.com/od/hardwarenetworkgear/ss/wirelessadap
ter_4.htm
Point-to-multipoint communication - Wikipedia, the free encyclopedia.
(n.d.).Wikipedia, the free encyclopedia. Retrieved December 14, 2012,
from http://en.wikipedia.org/wiki/Point-to-multipoint_communication