enterprise networking(en) march2009 ncceducation
TRANSCRIPT
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Introduction
This assignment will allow me to demonstrate understanding of installing networks
including the available equipment, access mechanisms, security issue and
shearing data between different sites. I shall plan the implementation of a
computer network in municipal libraries department including the estimated coast
of installing the network. The department is responsible for ten separate branch
libraries throughout the town.
Mainly this library loan books to the general public. We have ten separate branch
libraries throughout the town. Every branch has a same name but place deferent
and it has a central head office. Each branch library has a standalone system.
The department will be fully automate the library system each branch so that
loans and returns can be recorded without the need for staff. To manually enter
details such us Book, CD and DVD title, lender, date of issue and date of return,
etc. all libraries are connected in single system for customer facilities. No need for
visited every branch.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 1
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Task – 1
Investigate Method that can be used for automatic recording of library item loaned or
returned by customer. Pay particular attention to:
a) The Method of recording the item being loaned or returned.
b) The Method of recording the customer making the loan or returned the item.
C) The due date of return will be generated for items on loan
d) How data may be required manually edited if required.
e) The Equipment required implementing this.
f) The cost to install the equipment in the ten branch libraries.
Provide a recommendation for which equipment to purchase including reason for this
recommendation.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 2
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
a)
Method of recording the library item loaned or returned are below.
Open library management application to computer for check customer
information.
Checking out / Returning checked out item to customer
After finding Item, scan the Barcode / Search to find a Barcode for an item or
type the barcode of item.
item information will be displayed on the screen and save to database on central
server, including Item name, Item title, Item type, Call no, Copy, Publication and
all information of item on loan or reserve and any fine.
when transaction successful, the scanner and computer will beep, and the
receipt printer will print a record of the transaction
b)
Method of recording the customer making the loan or returned the item are below.
Open library management application to computer for check customer / item
information.
Scan the library/membership card with the Barcode Scanner.
Customer information Store to database on central server and display including,
User ID, user name, expiration of membership, Phone Number, date of issue
etc.
After complete transaction, tear out the receipt and give it to the customer.
C) The due date of return will be generated for items on loan
Customer with regular cards can have up to 6 loans at a time
Customer with Family cards can have up to 10.
The loan period/due date of return is one weeks.
If Overdue the item, then for each time $0.50 per customer set of fine.Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 3
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Once a fine is created, it must be paid to clear the Customer's record
d) If required to entry data manually then I can use library Entry Book, for example:
S/L no Customer name
Customer ID Address Item type Item title ISBN no Date of issue
Signature
1 Jhon U08861 E1 CD Mission Y12-80 26/05/2008
2 Smith D08065 E14 DVD KARZ UC14-1 26/05/2008
3 Gayem S05665 T41/5 BOOK SADU U963-47 20/05/2008
4 Patron A00168 GF7 BOOK H.O.G T 78568 15/05/2008
5 Bond S18744 Bichdown CD IELTS-2 W85214 16/05/2008
6 Myckl N85700 T99/2 CD IELTS-4 Y 2-45-1 12/05/2008
7 Hussy S04767 43Y DVD Superman Y12-694 06/05/2008
e) Equipment required to implementing computerized system.
PC: pc with Intel Pentium 4 processor, 1 GB RAM, 2x*GB/1.5 TB hard disk,
10/100/1000 base-TX Network Interface Card (NIC Card)
Server: server with Intel Core Duo 3GHz processor, redundant dual power,
4(four) SCSI hot plug hard drive with RAID controller and other features.
Network application: windows 2003 server , Linux
Barcode redder (Pen type readers): use for check item and customer
Inter connecting cable: Fiber optic cable, twisted pair cable.
NIC card: A Network Interface Card (NIC Card) will be use to interface between
a computer and network cable.
MAC Bridge: A bridge might be used to connect two different networks.
Repeater: repeater will be use to connects two segment of library network
cable. It retimes and regenerates the signals to proper amplitudes and sends
them to the other segments
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 4
details, The Pen type readers consist of a light source and a photo diode that
are placed next to each other in the tip of a pen or wand. The photo diode
measures the intensity of the light reflected back from the light source and
generates a waveform that is used to measure the widths of the bars and
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Router: A router is used to route data packets between the deffrent branch
networks.
Connector: RJ 45 connector with RJ 45 Jack and fiber optic connector.
UPS : (for servers ) uninterrupted power supply of 12 KVA capacity with backup
time of 180 minuet at full load.
f) The cost to install the equipment in the ten branch library
NAME Type NUMBER OF EQUIPMENT
PRICE COST
Unhitch MD210-1 Bar coda redder
Bar coda redder 15 57.96$ 869.40$
Sony VAIO JS All-in-One Desktop
Pc 25 430$ 10750$
HP rp5700 Business Desktop PC
Pc 5 850$ 4250$
Omron E32-DC-200
(50 mm)
Fiber Optic Cable 850 mm 58.45 $ 993.65$
Extreme Networks Networks Summit X150-
48t
Bridge 12 149$ 1788$
Nexans UTP category 5e
solid cable (Box,305m)
UTP cable 3 box 69.50$ 208$
HP 161105-001 CPQ NC3134
NIC Card 30 30$ 900$
APC American Power Conversion Back-UPS RS
1300 VA 120 V UPS System
UPS 30 175$ 5100$
MT-RJ Multimode Fiber Optic Connector
Connector 20 5.10$ 102$
Netgear FVS318 10/100 Mbps 8-Port VPN/Firewall
Router:
Firewall Router 20 146$ 2920$
TOTAL COST 27881.05$
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 5
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Recommendation:-
I have used network equipment to install the network in 10 branch library for
computerized system.
At first computer used, without computer we can not think computerized system, to
insure computerized system I have used to each branch of server computer Windows
2003 server data center addition application.
Windows Server 2003, Datacenter Edition is designed for infrastructures demanding
high security and reliability. Windows Server 2003 is available for x86, Itanium, and
x86_64 processors. It supports a maximum of up to 32 processors on 32-bit or 64
processors on 64-bit hardware. 32-bit architecture also limits memory addressability to
128 GB, while the 64-bit versions support up to 2 TB. Windows Server 2003,
Datacenter Edition, also allows limiting processor and memory usage on a per-
application basis.
Windows Server 2003, Datacenter Edition, also supports 8-node clustering. Clustering
increases availability and fault tolerance of server installations, by distributing and
replicating the service among many servers
And for central server I have used Linux operating system, it is designed for general
purpose use on desktops and servers, distributions may be specialized for different
purposes including: computer architecture support, embedded systems, stability,
security, localization to a specific region or language, targeting of specific user groups,
support for real-time applications, or commitment to a given desktop environment.
Furthermore, some distributions deliberately include only free software. Currently, over
three hundred distributions are actively developed, with about a dozen distributions
being most popular for general-purpose use
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 6
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Barcode redder used for recording library item and customer detail, when a customer
want to loan or return item to library, librarian will be check item Barcode and customer
ID Barcode use an array of hundreds of tiny light sensors lined up in a row in the head
of the reader, Item and customer detail will store to database in server. Its help to
librarian for find item and customer detail quickly, I think that barcode redder will be
help to record correct information.
Interconnecting link used to establish network connection within different branch.
Without interconnecting link con not establish computerized network.
NIC Card used to connect computer with network, the purpose of the network card is to
prepare, send, and control data on the library network. A network card is the physical
interface between the computer and cable.
Bridge A bridge would allow these segments to see each other and use the same
network resources.
Firewall Modular hardware firewall system having Gigabyte Ethernet port, VPN access
port supporting DMZ configuration
Repeater used to interconnect tow part of network cable. By use repeater signal will be
proper amplitudes to send other part in long distance.
Connector used to connect cable with NIC card and other device
I have used router to routing date packet. It reads the information in each packet to tell
where it is going.
UPS: (uninterruptible power supply) USED for back up electricity, by use UPS I can be
protect data from loss when eclectic are unavailable.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 7
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Task – 2
Investigate the methods by which customer could fine details of item
for loan the whole department. As a minimum include the flowing
information:
a) How and where the data from all branches would be stored.
b) The detail supplied to the customer, e.g. item name, location, etc.
c) Security and data protection issue.
Provide a recommendation for how this search facility would be set
up.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 8
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
a)
Way and location of store Data from all branches.
From any branch data would be stored to the database by library management
application using the network.
When input data from any branch, data would be store/update to a central
server.
To each branch will be a server (request server).
All branch will be maintain by Central server(database server)
There are will be uses Hewlett-Packard 300GB universal hot-plug Ultra320 SCSI
hard drive. (The Compaq 146GB factory integrated hard drive is a storage
solution that has a FC-AL interface Type. Fiber Channel Arbitrated Loop or FC-
AL allows many servers and storage devices to be connected into a storage
network. This configuration offers flexibility, performance and reliability
advantages to high-end systems. This drive is an upgrade and has a data
transfer rate of 200MB per second and offers the flexibility and expandability to
meet any end-users growing storage capacity requirements.)
Any one / members can fiend information of library item to any branch.
b)
The detail supplied to the customer.
After processing loan or return item, to the customer supplied detailes including the…
1. Membership ID
2. Item name
3. Item Serial No
4. Date of issue/Return
5. Due (if any)
6. Member Address
7. Phone number
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 9
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
c)
Security and data protection issue for municipal library
There is no definitive blueprint for designing a secure network; network security has to
be custom tailored to fit the needs of your network, not anyone else's. Consider, for
example, a midsize law firm network. The firm may have a special case information
system that provides access to the firm's cases to lawyers while they are on the road.
While in the office, they no doubt provide all staff with a connection to the Internet.
Network security for such a firm would need to allow access to the case information
system for authorized users on the outside of the network, while simultaneously
ensuring that full access to the Internet is always available to staff on the inside of the
network.
Contrast such a firm to a standard public library with a bibliographic database that
needs to be made available to all users on the Internet and in the library. Good network
security protects your network in a manner that is consistent with its purpose. That
being said, it is important to look at network security from as many angles as possible.
Over view of Security and data protection issue of my library:
The Internet is will be available for public use during library hours for the
purpose of study, reference and research,
Patrons/Brower is required to sign an Internet Registration Form and accept this
online Internet Usage Policy.
Patrons/ Brower are can NOT to be installing their own software programs on
the Library’s computers.
Anti-virus is used to identify and remove computer viruses, as well as many
other types of harmful computer software, collectively referred to as malware.
While the first antivirus software was designed exclusively to combat computer
viruses. Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 10
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Database can access with a limited number of licenses needs to have regulated
access.
I will be provide unfiltered Internet access to staff but only filtered Internet
access to patrons.
The Library has implemented software filtering on all of its public Internet
computers. The software protects against access to visual depictions of
obscenity and materials that are "harmful to minors"
Filtering software will block many specific sites that may be offensive to some
users, but may not block all materials that may be offensive to all users.
Users should be aware that the Internet is not a secure medium and that third
parties May be able to obtain information regarding users' activities. However,
Ash field library will not release information on the use of specific Internet
resources by Members of the public except as required by law or necessary for
the proper operation Of the Library.
Recommendation:-
In this task I have define the way of store Data and .Where I will be store all data to
central device via branch server there are have a storage area network (NAS) for store
all information of municipal library The primary purpose of NAS is the transfer of data
between computer systems and storage elements and among multiple storage
elements, and to each branch have a 16 GB hard disk for store branch personal
information.
When any one search for any library item to any branch of library, if found this item in
this library then Ok, otherwise he / she can find this item to other branch of this library
by network via accessing library database on to central server. If found this item then
he or she can go physically to this library branch for collection this item.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 11
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Task – 3Investigate the possible network topologies that could be create the
network (LAN) within each branch library and the network arose the
whole Municipal Library Department. Explain how the topology
operates.
Provide a recommendation for which topology to use for each branch
and for the whole department including reasons for this
recommendation.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 12
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Network topology is used to municipal library
The possible network topology is used to municipal library are STAR topology. That
could be used to create the network (LAN) within each breach library and the network
across the whole municipal library department.
Figure: A star network for Municipal Library
Advantages of Star Network/Centralize Network
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 13
Local Branch Central server
Switch
The star LAN topology, each station is directly connected to a common central
node. Typically, each station attaches to a central node, referred to as the star
coupler, via two point-to-point links, one for transmission and one for reception. In
general, there are two alternatives for the operation of the central node. One
approach is for the central node to operate in a broadcast fashion. A transmission
of a frame from one station to the node is retransmitted on all of the outgoing
links. In this case, although the arrangement is physically a star, it is logically a
bus; a transmission from any station is received by all other stations, and only one
station at a time may successfully transmit. Another approach is for the central
node to act as a frame switching device. An incoming frame is buffered in the
node and then retransmitted on an outgoing link to the destination station.
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Recommendation:-
I have used star topology to create network (LAN) within each branch library and the
across the whole Municipal Library Department, Because Star networks are relatively
easy to install and manage, Easy to detect faults and to remove parts, No disruptions to
the network then connecting or removing devices, Reduces risk of failure, Expanding
the network is simple and Managing the network is centralized.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 14
Better performance: Passing of Data Packet through unnecessary nodes
is prevented by this topology. At most 3 devices and 2 links are involved in
any communication between any two devices which are part of this
topology. This topology induces a huge overhead on the central hub,
however if the central hub has adequate capacity, then very high network
utilization by one device in the network does not affect the other devices in
the network.
Isolation of devices: Each device is inherently isolated by the link that
connects it to the hub. This makes the isolation of the individual devices
fairly straightforward, and amounts to disconnecting the device from the
hub. This isolated nature also prevents any non-centralized failure to affect
the network.
Centralization: As the central hub is the bottleneck, increasing capacity of
the central hub or adding additional devices to the star, can help scale the
network very easily. The central nature also allows the inspection traffic
through the network. This can help analyze all the traffic in the network and
determine suspicious behavior.
Simplicity: The topology is easy to understand, establish, and navigate.
The simple topology obviates the need for complex routing or message
passing protocols. As noted earlier, the isolation and centralization
simplifies fault detection, as each link or device can be probed individually.
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Task – 4
Investigate the network media that could be used within each branch
library and to connect between deferent sites in the whole Municipal
Library Department. You will need to investigate data transfer rate,
the packages available from supplier in your location and the cost of
these.
Provide a recommendation for which topology to use for each
branch and for the whole department including reasons for this
recommendation.
The network media that could be used within each branch library: Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 15
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
To ensure the network media that could be used within each branch library and to
connect between different sites in the whole Municipal Library Department. I will to
need to ensure data transfer rates.
The Network media that I will be use within each Branch Library.
Fiber optic cable (for branch to central server connection)
Twisted cable(UTP) (for branch network connection)
Omron E32-DC-200 Fiber Optic Cable
Fiber Optic Cable Standard Detection Distance 50 Millimeters With 30 x 30 Millimeter
Opaque Object Temperature -40 to 158 Degrees Fahrenheit Minimum Object Diameter
0.003 Inch Fiber Material Core Plastic Cable Length 6 Feet Black Polyethylene General
Purpose Diffuse Type
Figure: Omron E32-DC-200fiber optic cable
Max. Sensing Distance…………50mm
Type………...General Purpose Diffuse
Weight…………………………….0.10
Price…………………………… $58.45
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 16
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Nexans UTP category 5e solid cable
Nexans are one of the world’s largest manufacturers of network and commas cabling
and comes with a 20 year guarantee. This type of network cable is used for permanent
installations and there is metro marking on the cable to show how much cable is left in
a part used box.
Figure: UTP cable
Max. Sensing Distance ( Box) ……………… 305m
Speed and throughput…………….10 to 1000 Mbps
Price:……………………….……………….. £69.99
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 17
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Recommendation:
I will be use to install municipal library network as a network media Fiber optic cable
(for connect branch with central server), UTP cable (for interconnect branch network)
Reason of choice this medium:
Fiber optic cable
fiber optic cable is a glass or plastic fiber that carries light along its length
transmission over longer distances and at higher bandwidths (data rates) than
other forms of communications
Fibers are used instead of metal wires because signals travel along them with
less loss, and they are also immune to electromagnetic interference.
Fibers are also used for illumination, and are wrapped in bun
Specially designed fibers are used for a variety of other applications, including
sensors and fiber lasers.
UTP cable
UTP cable is used in a variety of networks
Changes in configuration are simple
making it easy to accommodate moves
UTP wiring is more economical than twisted
It is less expensive to re-configure as user locations change
It is less expensive to install
UTP cabling offers migration to LAN without re-cabling, since the same cable is
used for both LAN and AS400.
Speed and throughput—10 to 1000 Mbps.
Excellent cost/quality ratio.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 18
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Task – 5Create a plan for Municipal Library Department network to deal
with major disasters and also to deal with the store term failure of
the system (e.g. a power cut in one branch library). It is impotent
that the system can be update after temporary failure and that
data is accessible in the event of a major disaster.
Plan for disaster overcome in library:
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 19
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Disasters in libraries have many causes, from the dramatic: arson, lightning, tornadoes,
hurricanes and earthquakes to the mundane: electrical faults, Hardware or software
failure, virus attack and burst pipes. A disaster control plan is the written documentation
that records the countermeasures taken against an event which is wholly unexpected
and damages the collections of an institution. It is a document which all organizations,
not just libraries, should have.
Disaster Plans
Generally, a disaster plan describes activities for preventative, responsive and recovery
initiatives. Typically, a disaster plan consists of the following sections:
Storage backup
I will be Keep important financial and database records organized and safe ” Make
backup copies of all critical files such as customer detail, item detail, accounting and
employee payroll data, as well as customer lists, and inventory and store these records
in a safe off-site location and ISP server. By using virtual backup method, these
methods are….
The Virtual Full Backup method was pioneered by R1Soft and overcomes limitations of
the other known backup methods. Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 20
Building Maintenance
A regime of planned and documented building maintenance will go a long way
towards minimizing the risk of floods, fire, theft, vandalism and invasion by
pests. Routines should include regular temperature and humidity checks in
areas designated as vulnerable to damp.
Equipment Maintenance
Equipment maintenance is essential both to ensure that equipment failure does
not cause a disaster and to assure the reliability of equipment in a disaster
situation. Ensure that equipment stored to deal with a disaster is included in
maintenance routines
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
The chief drawbacks to all of the other backup methods that Virtual Full Backups
overcome are:
The need for a periodic Full Backup to be done e.g. every week. The weekly
Full Backup that other methods require is extremely time consuming and
intensive on critical server Disk I/O resources.
Incremental Backup methods make restoring very complex as each incremental
must be replayed to return files to a particular point in time.
Incremental and Differential Backup methods provide no long term archiving or
convenient rotation of old backups. For example you can not point and click
Delete an Incremental backup without breaking other backup sets and loosing
data.
The other backup methods are based on tape and do not properly take
advantage of disk based storage. For example a Deltas or unchanged file is
stored in every Incremental backup set multiple times. This makes sense when I
storage media am tape and it needs to be duplicate in each tape. Much Disk
Based backup use Virtual Tape Library (VTL) software to make a file appear like
a large tape. If the storage medium is Disk Based there is no need to store a
Delta or unchanged file more than once! Virtual Full Backups overcome this
limitation.
Hard copy
I will be Keep all information to hard copy in a safe off site.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 21
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
ReferenceSerial No URL Date Type of
reference
1 http://www.m25lib.ac.uk/m25dcp/prevent.html 18/01/2009 Text
2 http://wiki.r1soft.com/display/TP/Backup+Method+-+Virtual+Full+Backup75
19/012009 Text
3 http://en.wikipedia.org/wiki/Star_network 18/012009 Text
4 http://www.system3x.com/as400_cabling/ 09/022009 PDF
5 http://ops.fhwa.dot.gov/publications/telecomm_handbook/chapter2_01.htm
29/012009 Text
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 22