Sie sind auf Seite 1von 28

IMPLEMENTATION OF VLAN ON PACKET TRACER

PROJECT FILE

ON

IMPLEMENTATION OF VLAN ON PACKET


TRACER

BACHELOR OF ENGINEERING

IN
COMPUTER SCIENCE & ENGINEERING

Submitted to: Submitted by:


Lokesh Pawar Misham
Bandna Kumari 17BCS2868
CSE-18(A)

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


CHANDIGARH UNIVERSITY,GHARUAN

1
IMPLEMENTATION OF VLAN ON PACKET TRACER

ACKNOWLEDGEMENT

We would like to express our special thanks of gratitude to our teacher who gave me the
golden opportunity to do this wonderful project on the topic on vlan implementation of
packet tracer , which also helped us in doing a lot of research and we came to know
about so many new things .we are really thankful to them.
Again we would also like to thank friends who helped us a lot in finalizing this project
within the limited time frame.
This project really helped us to learn skills of networking and its functionality. I gained a
lot of knowledge while completing this project.
At last we are thankful to each and every person who helped us in completing this
project.

2
IMPLEMENTATION OF VLAN ON PACKET TRACER

ABSTRACT

Computer networks have become extremely important in our present-day


society. A majority of companies depend on the proper functioning of their
networks for communications, administration, automation, e-business
solutions, etc. The Local Area Network (LAN) is the most basic and
important computer network owned by
individual companies and could be used for interconnection with wide area
networks. A LAN permits effective cost sharing of high-value data
processing equipment such as mass storage media, mainframe computers or
minicomputers, and high-speed printers. Resource sharing is probably
equally as important where a LAN serves as the access vehicle for an
intranet or the Internet. In view of this, system managers need professional
tools to help them with the design and maintenance of LANs. A simulation
tool offers a way to predict the impact on the network of a hardware
upgrade, a change in topology, an increase in traffic load or the use of a
new application. So in this paper, a LAN network is designed using Cisco
Packet Tracer. The paper describes how the tool can be used to develop a
simulation model of the LAN for the College of Engineering of the. The
study provides an insight into various concepts such as topology design, IP
address configuration and how to send information in form of packets in a
single network and the use of Virtual Local Area Networks (VLANs) to
separate the traffic generated by different departments.
Keywords: Computer Networks, IP Addresses, Ping Test, Simulation Tool,
Subnetting.

3
IMPLEMENTATION OF VLAN ON PACKET TRACER

List of Figures

Figure number Title Page number

1 Structure diagram xiii

2 UML diagram xiii

3 ER diagram xiv

4 Working diagram xv

5-9 Screen shots xxii-xxiv

Table(1)

4
IMPLEMENTATION OF VLAN ON PACKET TRACER

Table of Contents

Sr. No. Topic Page No.


i Title Page i

Acknowledgement
ii ii
iii Abstract iii

iv List of figures iv

v Table of contents v

vi Chapter 1: Introduction vi-x

vii Chapter 2: SRS xi-xii

viii Chapter 3: Diagrams xiii-xv

ix Chapter 4: Project methodology xvi-xxi

x Chapter 5: Screen shots xxii-xxiv

xi Chapter 6: Conclusion and Future Scope xxv-xxvi

xii References xxvii-xxviii

Table(2)

CHAPTER 1- INTRODUCTION

5
IMPLEMENTATION OF VLAN ON PACKET TRACER

1.1 Introduction:

The need for computer networking was borne out of the need to use personal computers
for sharing information within an organization in form of messages, sharing files and data
bases and so forth. Whether the organization is located in one building or spread over a
large campus, the need for networking the computers cannot be over emphasized. As the
name implies, a Local Area Network (LAN) interconnects computers in a limited
geographic area. It provides high-bandwidth communication over inexpensive
transmission media .The corporate LAN has evolved from a passive background business
component to a highly active, visible core asset that enterprises rely on to support day-to-
day operations critical to their market success. Today’s network is a strategic instrument
that must be accessible anytime from anywhere-simultaneously offering fast, secure,
reliable services at scale regardless of location [2]. The main purpose of a network is to
reduce isolated users and workgroups. All systems should be capable of communicating
with others and should provide desired information. Additionally, physical systems and
devices should be able to maintain and provide satisfactory performance, reliability and
security. Resource sharing is probably equally of immense importance where a LAN
serves as the access vehicle for an intranet or the Internet . In view of this, system
managers need professional tools to help them with the design and maintenance of
LANs . A simulation tool offers a way to predict the
impact on the network of a hardware upgrade, a change in topology, an increase in traffic
load or the use of a new application. So in this paper, a LAN network is designed using
Cisco Packet Tracer. Cisco Packet Tracer (CPT) is a multi-tasking network simulation
software that can be used to perform and analyze various network activities such as
implementation of different topologies, selection of optimum path based on various
routing algorithms, creation of appropriate servers, subnetting, and analysis of various
network configuration and troubleshooting commands. In order to start communication
between end user devices and to design a network, we need to select appropriate
networking devices like routers, switches, hubs and make physical connection by

6
IMPLEMENTATION OF VLAN ON PACKET TRACER

connecting cables to serial and fast Ethernet ports from the component list of packet
tracer. Networking devices are costly so it is better to perform first on packet tracer to
understand the concept and behavior of the network. The paper describes how the CPT
tool can be used to develop a simulation model of the LAN. The study provides an insight
into Design and Simulation of Local Area Network Using Cisco Packet Tracer various
concepts such as topology design, IP address configuration and how to send information
in form of packet in a single network and the use of Virtual Local Area Networks
(VLANs) to separate the traffic generated by the different departments. VLANs are a new
type of LAN architecture using intelligent, high-speed switches. The simulation results
and performance analyses showed that the design was successful. The rest of the paper is
organized as follows: Section 2 discusses the different LAN topologies. This is followed
by a discussion in section 3 on the different types of transmission media. The concept of
IPv4 addressing and subnetting is presented in the development of the LAN simulation
model is presented; while section 7 presents the model’s simulation and results analyses.

.
1.2 Field Of Project:

VLANs are a new type of LAN architecture using intelligent, high-speed switches.
Unlike other LAN types, which physically connect computers to LAN segments, VLANs
assign computers to LAN segments by software. VLANs have been standardized as
IEEE802.1q and IEEE802.1p. There are two basic designs of VLANS. They are: Single-
switch VLANs and Multiswitch VLANs

Single Switch VLANs

7
IMPLEMENTATION OF VLAN ON PACKET TRACER

With single switch VLANs, computers are assigned to VLANs using special software,
but physically connected together using a large physical switch. Computers can be
assigned to VLANs in four ways:

 Port-based VLANs assign computers according to the VLAN switch port to which they
are attached

 MAC-based VLANs assign computers according to each computer’s data link layer
address

 IP-based VLANs assign computers using their IP-address

 Application-based VLANs assign computers depending on the application that the


computer typically uses.

This has the advantage of allowing precise allocation of network capacity.

Multiswitch

VLANs send packets between multiple switches, making VLANs with segments in
separate locations possible. When a frame is sent between switches it is modified and
includes a tag field carrying VLAN information field. When the frame reaches the final
switch, the tag field is removed prior to the frame being sent to its destination computer.
Multiswitch VLANs can also prioritize traffic .1p standard in the hardware layers and the
RSVP standard in the internetwork layers. IEEE802.1p works with the IEEE802.11ac
frame definition which includes a special priority field.

1.3 Role of VLAN:

Because of the problems described above that are inherent in deploying large, flat
networks, ATN made an implementation of virtual networking a requirement for vendors'
bids when preparing the new design in 1995 (Gogan, 1997). While the product lines of

8
IMPLEMENTATION OF VLAN ON PACKET TRACER

several vendors were examined and evaluated, the University selected Cabletron
Systems, Inc. and their SecureFast technology as being the best solution for ATN's
purposes (Gogan, 1997). While several reasons for the selection were listed, Cabletron's
VLAN implementation set it apart from competing vendors. SecureFast allowed port,
MAC layer, protocol, and multicast grouping in its VLANs, while other vendors
implemented port-based VLANs only, based on IEEE 802.1Q or similar, proprietary
systems. While VLANs of that type would be generally useful, they would not address
the mobile-computing needs of University affiliates. However, the ATN employee
admitted that having multiple membership mechanisms created its own set of policy
issues. For example, if a user who is a member of a MAC-based VLAN connects her or
his machine to a port that is a member of a separate, port-based VLAN, which takes
precedence.

1.4 Purpose:
Though private vlans could be used as a solution, that may be beyond the scope of this
CCNA based discussion. Lets go back in time to the old days. A LAN was defined as a
local area network,a broadcast domain. All devices would be able to broadcast to each
other and receive broadcasts from each other. In the old days, if you wanted to separate
devices from hearing these broadcasts, you got a 2nd hub, a 2nd cable and literally made
a 2nd LAN. Heck, the military still does this in some deployments. With the advance of
technology, a way was devised to give the same result of separating certain devices from
hearing broadcasts, but use one cable and one switch. Thus the Virtual LAN was born. It
started out as being used to split up large broadcast domains, which then facilitated the
need to route in between the 2 LANs. Broadcast traffic was then kept out of the
unwanted LAN. However, routed traffic could still cross.I realize that in the technology
world that this is ancient history, but it is the beginning of the purpose of a vlan. Today,
with the requirements of businesses, vlans are the norm. Layer3 switches route in
between their vlans and will probably have ACLs to limit the routed traffic that may be
permitted to cross between vlans. Remember that security doesn't just reside in he

9
IMPLEMENTATION OF VLAN ON PACKET TRACER

network with ACLs and firewalls. It spans to the servers, GPOs, file system rights and
the like. Security needs to be a layered approach that vlans and ACLs are only a small
part.

1.5 Functionality:

1. Understand the Problem Statement

2. network Preprocessing and Cleaning

3. connection between devices

4. Extracting Features from LAN

5. Model Building: Vlan implementation

1.6 Milestones:

deadlines for completion and expected deliverables :

1. Facade Application showing screen and with temporary transitions and text :
10thapril 2019

2. Communication Protocol: application connects to network/server: 25th 2019

3. Functional Milestone 1: 7th march 2019

4. Alpha Application (with full functionality): 30th march 2019

10
IMPLEMENTATION OF VLAN ON PACKET TRACER

5. Stability: 5thapril 2019

6. Release: 10thapril 2019

CHAPTER 2- SRS

Technology Used: Networking


Framework Used:
Operating System Used: Windows 10 / 8

Hardware requirements:
 Core i5(Processor)
 4 GB RAM
 3 MB Cache memory
 Hard Disk 10GB

Software requirements
 Operating System: Windows xp
 Windows 10

 Packet tracer

 authentication from Google.

11
IMPLEMENTATION OF VLAN ON PACKET TRACER

Front-End:

As we know that such computer language can be use in software development, which
must have the following criteria

 Easy To Learn
 Convenient in coding
 Easy To use control structure
 Lesser input provides larger output
 Highly efficient and productive
 Compatibility with other language and other tools
 Support latest technologies
 Provides flexibility etc.

User Interface:

 Each control, including states enabled and operations.

 Supported orientations and transitions between them.

 Functionality represented.

 Networking

12
IMPLEMENTATION OF VLAN ON PACKET TRACER

CHAPTER-3
3.1 Structured diagram for project:

Fig(1)

3.2 UML diagram :

Fig(2)

13
IMPLEMENTATION OF VLAN ON PACKET TRACER

3.3 ER for project:

Fig(3)

3.4Working diagram:

So far you’ve been using the console to run code. That’s a great place to start, but
you’ll find it gets cramped pretty quickly as you create more complex ggplot2 graphics
and dplyr pipes. To give yourself more room to work, it’s a great idea to use the script
editor. Open it up either by clicking the File menu, and selecting New File, or using
the keyboard shortcut Cmd/Ctrl + Shift + N. Now you’ll see four panes:

14
IMPLEMENTATION OF VLAN ON PACKET TRACER

Fig(4)

The script editor is a great place to put code you care about. Keep experimenting in the
console, but once you have written code that works and does what you want, put it in
the script editor. RStudio will automatically save the contents of the editor when you
quit RStudio, and will automatically load it when you re-open. Nevertheless, it’s a
good idea to save your scripts regularly and to back them up.

15
IMPLEMENTATION OF VLAN ON PACKET TRACER

CHAPTER-4

Methodology

This project is a combination of a descriptive and a case study. As such, the research
methodology concentrated primarily on fact gathering and interpretation rather than
experimentation and data analysis. Background information was taken from the literature.
This information including theory on the design and implementation of local area and
wide area networks (WANs), concentrating on large, flat switched networks, common
problems in the implementation of such networks, and a description of VLAN solutions
in general and the Cabletron Systems, Inc. VLAN technologies in particular. This
information formed the basis for the first portion of the paper. Information for the second
portion, dealing with the UNC-CH experience with VLANs, came from two sources:
ATN documentation and interviews with ATN personnel who were involved in the design
and implementation of VLAN technology at UNC-CH.

Networking Issues

While the Ethernet-based LAN has proven to be a robust and scalable network
architecture, it does have limitations. As the number of users grows, the number of
protocols in use on the network increases, and/or users become more geographically
dispersed, a simple Ethernet LAN cannot be counted on to perform adequately. To
illustrate, let us start with a small LAN and then observe what happens as it grows. The
initial LAN configuration is five users and a central file server. These machines are all in
a small office, and can be connected using a simple Ethernet LAN as shown. For the sake
of argument, let us assume they all use the same protocols for layer 3 and4.

All is well until another group of users wants to be connected to the same LAN. They are
relatively far away from the original workgroup. Lengthening the LAN cable may or may

16
IMPLEMENTATION OF VLAN ON PACKET TRACER

not work, as it can only be a certain length. If they are too far away, a solution is to
connect the two sets of users through a repeater, which regenerates the signals on the
cable and allows a greater distance between groups.

Adding a repeater solves the distance problem, but the increased number of users on the
network increases the potential for collisions. The network could become unusable at
times because of the high collision rate. One solution: install a bridge to divide the
network into two separate collision domains. Collisions on one side do not affect users on
the other side.

This solution works to reduce the number of collisions. Unfortunately, network


performance is still degraded, since the users on the other side of the bridge frequently
send traffic across the bridge to the server, which then uses up bandwidth and causes
collisions on both segments. As an alternative to a bridge, a switch can be installed, with
at least one port reserved for the server and one for each workgroup. Ideally, each station
gets its own port on the switch, so that traffic intended for one station is never seen by the
others.

This solution still leaves the problem of broadcasts. Broadcasts in and of themselves are
not a problem; as discussed above they are necessary for the operation of most protocols
(Martin et al., 1994). However, broadcasts used by one protocol are a waste of bandwidth
and processing time for stations using other protocols. Each station must process
broadcast packets to determine whether or not they should take action. Bridges and
switches always pass broadcast packets to all attached stations. As an example, suppose
we have the two workgroups as before, separated by a bridge with a port for each
workgroup. Let us further suppose that two protocols are in use: TCP/IP and IPX/SPX
(which is a much "chattier" or broadcast dependent protocol). If one group uses TCP/IP
exclusively (the workgroup with the server) and the other group uses both TCP/IP and
IPX/SPX, then the bridge can be programmed to only allow TCP/IP traffic to cross.
However, if the second group uses IPX/SPX exclusively, then they will be unable to
communicate with the server, even if it is configured to speak both IPX/SPX and TCP/IP.

17
IMPLEMENTATION OF VLAN ON PACKET TRACER

If both groups have a mixture of Switch 24 TCP/IP and IPX/SPX machines, the NetWare
machines would be unable to communicate across the bridge. If a switch were in use, the
situation would be even worse. If the switch filters IPX/SPX traffic, then none of the
machines using IPX/SPX would be able to communicate, even with each other, since all
traffic would go through the switch. In such a case, the only solution may be to separate
the networks using a router instead of a switch. This solution will stop the general
broadcasts from going through, but can still enable broadcast-dependent protocols like
IPX/SPX to operate across the router boundary, given the proper configuration. However,
routers are much more expensive than switches, and are slower in their processing. Also,
some protocols such as NetBEUI are not routable, so devices using these protocols
cannot communicate across many routers.

The examples thus far have examined a relatively small network. The problems discussed
are compounded greatly when the network in question encompasses dozens, hundreds, or
even thousands of devices, as is more and more common in business and on college
campuses. For maximum flexibility a network should be "flat," with all stations ideally
on a single LAN, or at least separated only by bridges/switches (Roese, 1998). However,
as the examples above demonstrate, such a network would most likely operate poorly,
unless large amounts of resources, both money and time, are spent on its design and
configuration. Large, flat networks have their own set of problems, as well; the
algorithms used by switches to prevent "loops" in the network, such as Spanning Tree,
can lead to inefficiencies in packet transmission. Spanning Tree requires that the switches
on a flat network determine the one best loop-free route for packets to travel, rather than
taking advantage of the multiple possible routes available. Without Spanning Tree,
however, loops in the network can lead to "broadcast storms," where a single broadcast is
repeated over and over, wasting bandwidth at best and causing network failures at worst.
Ambiguous traffic on looped topologies can also cause individual switches to
"misunderstand" the actual layout of the network (Roese, 1998). The solution in today's
networks of separating groups of users by bridges, switches, and routers solves one set of
problems but introduces another: users who for logical reasons, such as organizational

18
IMPLEMENTATION OF VLAN ON PACKET TRACER

affiliation, protocol use, or resource needs, should be on a single LAN, are instead
separated into different networks. Roese (1998) identifies making "moves, adds, and
changes" as the single biggest problem in such networks, since such operations are often
quite costly in terms of the networking authority's resources, to say nothing of the lost
productivity while the end user waits for the time-consuming process to be completed.
Virtual Local Area Networks provide the capability to deploy a flat, switched network
that allows users to be grouped together logically, while preventing the broadcast,
collision, security, and other problems associated with large, flat networks.

Need of VLAN

These are few reasons why we should use VLANs –

1. To create more flexible designs that group users by department, or by groups that work
together instead of by physical location.

2. To segment devices into smaller LANs (Broadcast Domains) to reduce overhead


caused to each host in the LAN.

3. To reduce the workload for the Spanning Tree Protocol (STP) by limiting a VLAN to a
single access switch.

4. To ensure better security by keeping hosts that work with sensitive data on a separate
VLAN.

5. To separate traffic sent by a IP phone from traffic sent by PCs connected to the phones.
6. A proper VLAN design can ensure that only devices that have that VLAN defined on it
will receive and forward packets intended as source or destination of the network flow.

7. VLAN's can be used to create broadcast domains which eliminate the need for
expensive routers.

8. We can break apart our network as needed without having to go and move cables
around; if we used different switches for each group then we would have many more

19
IMPLEMENTATION OF VLAN ON PACKET TRACER

switches and much more cabling in place to support them. 9. VLANs allow QoS
measures to be taken on devices normally fighting for shared bandwidth.

Advantages of VLAN

There are several advantages to using VLANs.

Performance

In networks where traffic consists of a high percentage of broadcasts and multicasts,


VLAN's can reduce the need to send such traffic to unnecessary destinations. Example: In
a broadcast domain consisting of 10 users, if the broadcast traffic is intended only for 5 of
the users, then placing those 5 users on a separate VLAN can reduce traffic. Compared to
switches, routers require more processing of incoming traffic. As the volume of traffic
passing through the routers increases, so does the latency in the routers, which results in
reduced performance. The use of VLAN's reduces the number of routers needed, since
VLAN's create broadcast domains using switches instead of routers.

Simplified Administration

70% network costs are a result of adds, moves, and changes of users in the network.
Every time a user is moved in a LAN, new station addressing, and reconfiguration of
hubs and routers becomes necessary. Some of these tasks can be simplified with the use
of VLAN's. If a user is moved within a VLAN, reconfiguration of routers is unnecessary.
In addition, depending on the type of VLAN, other administrative work can be reduced or
eliminated. VLAN's is a tool that created which can allow network managers to drag and
drop users into different VLAN's or to set up aliases.

Cost and Time Reduction

VLANs can reduce the migration cost of stations going from one group to another.
Physical reconfiguration takes time and is costly. Instead of physically moving one

20
IMPLEMENTATION OF VLAN ON PACKET TRACER

station to another segment or even to another switch, it is much easier and quicker to
move it by using software. 20 Broadcast Control Broadcasts are required for the normal
function of a network. Many protocols and applications depend on broadcast
communication to function properly. A layer 2 switched network is in a single broadcast
domain and the broadcasts can reach the network segments which are so far where a
particular broadcast has no scope and consume available network bandwidth. A layer 3
device (typically a Router) is used to segment a broadcast domain.

Creating Virtual Work Groups

VLANs can be used to create virtual work groups. For example, in a campus
environment, professors working on the same project can send broadcast messages to one
another without the necessity of belonging to the same department. This can reduce
traffic if the multicasting capability of IP was previously used.

Security

VLANs provide an extra measure of security. People belonging to the same group can
send broadcast messages with the guaranteed assurance that users in other groups will not
receive these messages.

Physical Layer Transparency

VLANs are transparent on the physical topology and medium over which the the network
is connected.

21
IMPLEMENTATION OF VLAN ON PACKET TRACER

CHAPTER-5

1.1 Screenshots:

22
IMPLEMENTATION OF VLAN ON PACKET TRACER

23
IMPLEMENTATION OF VLAN ON PACKET TRACER

24
IMPLEMENTATION OF VLAN ON PACKET TRACER

CHAPTER-6

Conclusion

Network design has been and will be a process based on compromise. No one design
offers a complete, perfect solution. While the deployment of flat, switched networks has
definite advantages, such networks have problems not found in other architectures. The
use of VLAN technology in a switched network can minimize or even eliminate these
problems, allowing enterprises to make use of this topology without losing as much or
more than they gain. The University of North Carolina at Chapel Hill has made a
commitment to using VLAN technology over a flat network fabric. While this decision
has caused problems, and requires a much closer relationship with a single vendor than
has traditionally been required in an academic IT environment, overall the system has
done everything the University has wanted it to do. It has also increased performance,
improved network security and reduced the resources needed to manage the network.

25
IMPLEMENTATION OF VLAN ON PACKET TRACER

The Future of VLAN Technology

It is difficult to project the future of VLANs, o say the least. While the technology does
have great potential, the fractured nature of the current landscape in terms of multiple
implementations with limited or no interoperability severely limits the growth rate of
VLAN implementation. The single proposed standard currently available only partially
addresses this problem. However, should the standard be improved or, as with other
technologies, a single vendor or consortium of vendors develops an implementation
which becomes the de facto standard, VLAN technology should find its way into most if
not all enterprise networks. With their capability to resolve the problems that hamper the
otherwise excellent flat network topology, VLANs can enhance network performance and
security while reducing management overhead.

26
IMPLEMENTATION OF VLAN ON PACKET TRACER

CHAPTER-7

References

Academic Computing Advisory Committee (1986). A plan for campus-wide academic


computing and digital communications. Chapel Hill, NC: University of North Carolina

Baker, R. H. (1995). Network security: How to plan for it and achieve it. New York:
McGraw-Hill, Inc.

Chappell, L. A. and Hakes, D. E. (1994). Novell’s guide to NetWare LAN analysis. 2nd
ed. Alameda, CA: SYBEX Inc.

Comer, D. E. (1995). Internetworking with TCP/IP, volume I: Principles, protocols, and


architecture. 3rd ed. Upper Saddle River, NJ: Prentice Hall, Inc.

Derfler, F. J. and Freed, L. (1996). How Networks Work. 2nd ed. Emeryville, CA: Ziff-
Davis Press, Inc.

Designing with Smart Networking Services: A Smart Network VLAN design guide from
Systems Engineering. (1998). Rochester, NH: Cabletron Systems, Inc.

Gogan, J. (1997) Why Cabletron as a preferred network vendor. [online].

Available: http://www.unc.edu/~gogan/whyctron.html. (February 18, 1999) Henry, P. D.


and De Libero, G. Strategic networking: From LAN and WAN to

information superhighways. London: International Thomson Computer Press Institute of


Electrical and Electronics Engineers (1998). IEEE P8021.Q, IEEE standards for local and
metropolitan area networks: Virtual bridged networks.

New York: Institute of Electrical and Electronics Engineers IP host communication in


bridged, routed and SecureFast virtual networks1997. [online].

27
IMPLEMENTATION OF VLAN ON PACKET TRACER

Available: http://www.cabletron.com/white-papers/cullerottoc/index.html. (March 1,


1999) Martin, J., Chapman, K. K., & Leben, J. (1994). Local area networks:

Architectures and implementations. 2nd ed. New Jersey: P T R Prentice Hall, Inc.
Metcalfe, R. M. & Boggs, D. R. (1976) Ethernet: Distributed packet switching for local
computer networks. Communications of the ACM 19, 395 – 404 Passmore, D. and
Freeman, J. (1998). The virtual LAN technology report. [online].

Available: http://www.3com.com/nsc/200374.html. (October 2, 1998) Roese, J. (1998)


Switched LANs: Implementation, operation, maintenance.

New York: McGraw-Hill, Inc.

28

Das könnte Ihnen auch gefallen