2. COMPANY PROFILE: TCIT-IT
Telecommunications Consultants India Ltd (TCIL) is a leading ISO - 9001:2000 certified public sector
undertaking.
TCIL, a premier telecommunication consultancy and engineering company with a strong base in
Telecommunication & Information Technology (IT).
It was incorporated in 1978 by Department of Telecommunications (DOT), Government of India under
the aegis of Ministry of Communications, headed by Minister of Communications and Information
Technology.
The Organizational Structure is formed with the objectives of providing globally world-class technology
and Indian expertise in all fields of Telecommunications and to provide total Quality management &
excellence in project execution.
3. TCIL-IT is managed by ICSIL (Intelligent Communication Systems India Ltd.), a Joint Venture of TCIL
(Telecommunication Consultants India Ltd), a Govt. of India Enterprise and DSIIDC (Delhi State Industrial
Infrastructure Development Corporation Ltd).
TCIL-IT has tie-up with many government agencies to impart computer education for career advancement.
There are a number of PSUs under DoT. TCIL is one of them. Some other major companies are
1. Bharat Sanchar Nigam Limited (BSNL)
2. Mahanagar Telephone Nigam Limited (MTNL)
3. ITI Limited
TCIL has its presence in almost 45 Countries mainly in Middle East Africa, South-East Africa, South-East Asia
Asia and Europe.
4. COMPUTER NETWORKS
Computer network : A collection of computing devices that are connected in various ways in
order to communicate and share resources.
Usually, the connections between computers in a network are made using physical wires or
cables. However, some connections are wireless, using radio waves or infrared signals.
The purpose of a network is to share resources-
A resource may be:
-A file
-A folder
-A printer
-A disk drive
-Or just about anything else that exists on a computer.
5. 1. Network design
a. Peer-to-peer
b. Server/Client
2. Area network
PAN(Personal Area Network)
LAN(Local area network)
W-LAN(Wireless LAN)
CAN(Campus Area network)
SAN(Storage data area network)
GAN(Global area network)
Components of Networks
6. Network topology
Star Topology:
Ring Topology
Mesh Topology
Tree Topology
Hybrid Topology
3.3.iv. Network Protocols
3.3.v. Wired and wireless
7. 1. Network Design
Peer-to-Peer:
a peer-to-peer or P2P network, the tasks are allocated among all the members of the network.
There is no real hierarchy among the computers, and all of them are considered equal. This is
also referred to as a distributed architecture or workgroup without hierarchy.
A peer-to-peer network does not use a central computer server that controls network activity.
Instead, every computer on the network has a special software running that allows for
communications between all the computers.
8. Server – Client:
In a client/server network, a number of network clients or workstations request resources or
services from the network. One or more network servers manage and provide these
or services.
The clients are computers that depends on the server for data and software. Network
are also referred to as computer servers or simply servers. Sometimes a server is described in
terms of the specific service it provides, such as e-mail server, print server or storage server.
9. 2. Types of Networking
1. LAN – It stands for local area network.
Location:
In a building or individual rooms or floors of buildings or connecting nearby buildings together like a
campus wide network like a college or university.
2. MAN – It stands for metropolitan area network.
Location:
network connecting various cities.
3. WAN – It stands for wide area network. This communication system links LANs between cities, countries
and continents. The main difference between a MAN and a WAN is that the WAN uses Long Distance
Carriers rather than Local Exchange carriers.
Location:
City to city, across a country or across a continent. Wide Area Networks (WANs) connect LANs together
between cities or across a country.
10. 3. Network Topology
a) BUS Topology: All the nodes (file server, workstations, and peripherals) on a bus topology are
connected by one single cable.
Advantages of Bus Topology
• It is Cheap, easy to handle and implement.
• Require less cable
• It is best suited for small networks.
Disadvantages of Bus Topology
• The cable length is limited. This limits the number of stations that can be connected.
• This network topology can perform well only for a limited number of nodes.
b) RING Topology
• In a ring network, every device has exactly two neighbors for communication purposes.
• All messages travel through a ring in the same direction.
• A failure in any cable or device breaks the loop and can take down the entire network.
11. Advantage of Ring Topology
• Very orderly network where every device has access to the token and the opportunity to transmit.
• Easier to Manage than a Bus Network.
• Good Communication over long distances.
• Handles high volume of traffic.
Disadvantages of Ring Topology
• The failure of a single node of the network can cause the entire network to fail.
• The movement or changes made to network nodes affects the performance of the entire network.
c) STAR Topology
• In a star network, each node (file server, workstations, and peripherals) is connected to a central
called a hub.
• The hub takes a signal that comes from any node and passes it along to all the other nodes in the
network.
• Data on a star network passes through the hub, switch, or concentrator before continuing to its
destination.
12. Advantages of Star Topology
• Easy to manage
• Easy to locate problems (cable/workstations)
• Easier to expand than a bus or ring topology.
• Easy to install and wire.
• Easy to detect faults and to remove parts.
Disadvantages of Star Topology
• Requires more cable length than a linear topology.
• If the hub or concentrator fails, nodes attached are disabled.
• More expensive because of the cost of the concentrators.
d) TREE Topology
• A tree topology (hierarchical topology) can be viewed as a collection of star networks arranged in a
hierarchy.
• This tree has individual peripheral nodes which are required to transmit to and receive from one other
only and are not required to act as repeaters or regenerators
13. Advantages of a Tree Topology
• Point-to-point wiring for individual segments.
• Supported by several hardware and software vendors.
• All the computers have access to the larger and their immediate networks.
Disadvantages of a Tree Topology
• Overall length of each segment is limited by the type of cabling used.
• If the backbone line breaks, the entire segment goes down.
• More difficult to configure and wire than other topologies.
e) MESH Topology
• In this topology, each node is connected to every other node in the network.
• Implementing the mesh topology is expensive and difficult.
• In this type of network, each node may send message to destination through multiple paths.
14. Advantage of Mesh Topology
• No traffic problem as there are dedicated links.
• It has multiple links, so if one route is blocked then other routes can be used for data
communication.
• Points to point links make fault identification easy.
Disadvantage of Mesh Topology
• There is mesh of wiring which can be difficult to manage.
• Installation is complex as each node is connected to every node.
• Cabling cost is high.
f) HYBRID Topology
• A combination of any two or more network topologies.
• A hybrid topology always accrues when two different basic network topologies are connected.
• It is a mixture of above mentioned topologies. Usually, a central computer is attached with sub-
controllers which in turn participate in a variety of topologies.
15. Advantages of a Hybrid Topology
• It is extremely flexible.
• It is very reliable.
Disadvantages of a Hybrid Topology
• Expensive
16. NETWORKING DEVICES
HUB
The hubs used on UTP Ethernet networks are repeaters as well, but they can have many RJ45 ports
instead of just two BNC connectors. When data enters the hub through any of its ports, the hub
amplifies the signal and transmits it out through all of the other ports.
BRIDGES
A bridge is used to join two network segments together, it allows computers on
either segment to access resources on the other. They can also be used to
divide large networks into smaller segments.
ROUTERS
Routers are networking devices used to extend or segment networks by forwarding packets from
one logical network to another. Routers are most often used in large internetworks that use the
TCP/IP protocol suite and for connecting TCP/IP hosts and local area networks (LANs) to the Internet
using dedicated leased lines.
17. BROUTERS
Brouters are a combination of router and bridge. This is a special type of equipment
for networks that can be either bridged or routed, based on the protocols being
forwarded. Brouters are complex, fairly expensive pieces of equipment and
such are rarely used.
NICs (Network Interface Card)
Network Interface Card, or NIC is a hardware card installed in a computer
can communicate on a network.
WAPs (Wireless Access Point)
Access points act as wireless hubs to link multiple wireless NICs into a single
subnet. Access points also have at least one fixed to allow the wireless
network to be bridged to a traditional wired Ethernet network.
►MODEMS
A modem is a device that makes it possible for computers communicate over
telephone lines. The word modem comes from Modulate and Demodulate.
18. SWITCHES
Switches are a special type of hub that offers an additional
of intelligence to basic, physical-layer repeater hubs.
19. NETWORKING CABLES► Coaxial Cable
Coaxial cable is braided-grounded strands of wire that can provide some shielding and noise immunity;
however, the installation and the termination of the cable itself can be costly. Coaxial cabling, which uses
connectors called BNC (Bayonet Nut Connector) is known as, in forms of Ethernet, thick net and thin net,
in the older LAN technology, ARC net, and cable TV.
► Fiber Optic
Fiber optic cabling carries signals, which have been
converted from electrical to optical (pulses of light) form. It
consists of the core, either an extremely thin cylinder of
glass or optical quality plastic, which is surrounded by a
second glass or plastic layer called the cladding.
The interface between the core and cladding can
trap light signals by a process called Total Internal
Reflection (TIR), resulting in the optical fiber acting as a light pipe.
► Unshielded Twisted Pair (UTP)
Unshielded Twisted Pair (UTP) is a set of three or four pairs of wires with each wire in each pair twisted
around the other to prevent electromagnetic interference. UTP cabling uses RJ-45, RJ-11, RS232, and RS-
449 connectors. Because it is less expensive and easier to install, UTP is more popular than Shielded
Twisted Pair (STP) or Coaxial Cabling.
20. ► Shielded Twisted Pair (STP)
Shielded Twisted Pair (TP), like UTP, also has four pairs of wires with each wire in each pair twisted
together. However, the difference is that STP is surrounded with a foil shield and copper braided around
the wires that allows more protection from any external electromagnetic interference.
UTP cable
Straight UTP cable Cross UTP cable Crossover UTP cable
TYPES OF UTP cable
21. 1. Straight Cable
Usually use straight cable to connect different type of devices.
1) Connect a computer to a switch/hub's normal port.
2) Connect a computer to a cable/DSL modem's LAN port.
2. Crossover Cable
It is usually used to connect same type of devices.
1) Connect two computers directly.
2) Connect a router's LAN port to a switch/hub's normal port.
22. ► Rollover cable
A rollover cable is a network cable that connects a
computer terminal to network router’s console port.
23. IP Addresses
IP" stands for Internet Protocol, so an IP address is an Internet Protocol address. It is a fascinating product
of modern computer technology designed to allow one computer (or other digital device) to
communicate with another via the Internet.
There are broadly two types of IPs
o Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP),
the communications protocol that provides an identification and location system for computers on
networks and routes traffic across the Internet.
o Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol.
TYPES OF IP ADDRESSES
► Public IP Address
A public IP address is assigned to every computer that connects to the Internet where each IP is
unique. In this case, there cannot exist two computers with the same public IP address all over the
Internet.
24. ► Public IP address
An IP address is considered private if the IP number falls within one of the IP address ranges reserved
for private networks such as a Local Area Network (LAN).
25. Automatic Private IP Addressing (APIPA)
Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems that
enables a computer to automatically assign itself an IP address when there is no Dynamic Host
Configuration Protocol (DHCP) server available to perform that function. APIPA serves as a DHCP
server failover mechanism and makes it easier to configure and support small local area networks
(LANs). The computer selects an IP address from a range of addresses
from 169.254.0.0 - 169.254.255.255) reserved by the Internet Assigned Numbers Authority (IANA)
26. ► Cisco Certified Network Associate[CCNA] is a popular industry certification program in computer
networking developed by Cisco Systems.
► The CCNA program began in 1998 with one core certification focused on network Routing and
Switching, obtainable by passing a single 75-minute written exam.
► In 2013, Cisco began expanding the program to cover many other facets of computer networking
and network administration
► Some of the modules under the CCNA course comprise of basic router configuration, IP routing,
NAT/PAT, virtual LAN, catalyst switch operation, IP traffic management with ACL, etc.
► Those who specialize in the various courses offered by CCNA have better job opportunities.
28. Software used: CISCO Packet Tracer
Packet Tracer is a cross-platform visual simulation program designed by Cisco Systems that allows
users to create network topologies and imitate modern computer networks.
Packet Tracer allows users to create simulated network topologies by dragging and dropping routers,
switches and various other types of network devices. A physical connection between devices is
represented by a "cable" item .
Packet Tracer supports an array of simulated Application Layer protocols, as well as basic routing
with RIP, OSPF, EIGRP,BDP, to the extents required by the current CCNA curriculum.
Packet Tracer is a cross-platform network simulator designed by Cisco Systems to run on Mac OS,
Linux and Microsoft Windows.
29. A router is a networking device that forwards data packets between computer networks.
• Broadband Routers
Broadband routers can do different types of things. Broadband routers can be used to
connect computers or to connect to the Internet.
• Wired & Wireless Routers
Wired router has physical connection whereas wireless routers create a wireless signal home or office. So,
any PC within range of Wireless routers can connect it and use your Internet.
• Edge Router
This type of router are placed at the edge of the ISP network, they are normally configured to
external protocol like BGP (Border gateway protocol) to another BGP of other ISP or large organization.
• Inter-provider Border Router
This type of router is for Interconnecting ISPs, this is a BGP speaking router that maintains BGP sessions
with other BGP speaking routers in other providers' Assess.
TYPES
33. PASSWORD COMMANDS FOR ROUTERS
(i) Console Port
Cisco devices allow password protection of console access. This tech-recipe describes configuring the use of a password to protect
console of a Cisco switch.
Router(config)#line console 0
Router(config)#password CCNA
Router(config)#login
Router(config)#exit
(ii) Auxiliary port
Router(config)#line aux 0
Router(config)#password CCNA
Router(config)#login
Router(config)#exit
(iii) Enable password
Router(config)#enable password CCNA
Router(config)#exit
Router(config)#service password-encryption
34. To assign IP ADDRESS to Routers
Router 1
Router(config)#interface serial 0/0/0
Router(config)#ip address 11.0.0.1 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface fast ethernet 0/0
Router(config)#ip address 10.0.0.1 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router 2
Router(config)#interface serial 0/0/0
Router(config)#ip address 11.0.0.2 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface fast ethernet 0/0
Router(config)#ip address 20.0.0.1 255.0.0.0
Router(config-if)#no shutdown
35. ROUTING
Routing is the process of moving a packet of data from source to destination. Routing is usually
performed by a dedicated device called a router.
PING: Ping is a network diagnostic tool used primarily to test the connectivity between two nodes or devices. To
ping a destination node, an Internet Control Message Protocol (ICMP) echo request packet is sent to that node.
1. Static routing
Static routing is a form of routing that occurs when a router uses a manually-configured routing entry, rather than
information from a dynamic routing traffic. In many cases, static routes are manually configured by a network
administrator by adding in entries into a routing table.
2. Default Routing
Default route is a setting on a computer that defines the packet forwarding rule to use when no specific route can
be determined for a given Internet Protocol (IP) destination address.
Router(config)#ip route 0.0.0.0 0.0.0.0 11.0.0.2
Router(config)#ip route 0.0.0.0 0.0.0.0 12.0.0.2
Route(config)#ip route 0.0.0.0 0.0.0.0 12.0.0.1
Route(config)#ip route 0.0.0.0 0.0.0.0 13.0.0.1
Route(config) #ip route 0.0.0.0 0.0.0.0 14.0.0.2
Router(config)# IP route network ID subnet mask Next IP address
36. 3. Dynamic Routing
Dynamic routing, also called adaptive routing, describes the capability of a system, through which routes are
characterized by their destination, to alter the path that the route takes through the system in response to a
change in conditions.
There are three types of Routing Protocols:
• Distance vector
• Linc state
• Hybrid
37. Router metrics: Metric is a measure used to decide which route is better (lower number is better). Each
routing protocol uses its own metric. For example, RIP uses hop counts as a metric, while OSPF uses cost.
1. Distance-vector Routing Protocols: Distance-vector Routing Protocols use simple algorithms that calculate a
cumulative distance value between routers based on hop count.
.
• RIP (Routing Info. Protocol)
• IGRP(Interior Gateway Routing Protocol)
Administrative Distance
Administrative distance number is used by routers to find out which route is better (lower number is better).
38. RIP(Routing Information Protocol
Router(config)# Router RIP
Router(config)#Version 2
Network 11.0.0.0
Network 10.0.0.0
Routing Information Protocol Version 2 (RIPv2)
• Distance-Vector protocol which some characteristics of Link State routing protocols. RIPv2 is classless
routing, which allows us to use subnetted networks also RIPv2 has the option for sending network mask in
the update to allow classless routing.
• RIPv2 support VLSM (Variable Length Subnet Masking).
• RIPv2 support maximum metric (hop count) value of 15. Any router farther than 15 hops away is
considered as unreachable.
• RIPv2 supports triggered updates.
2. Link-state Routing Protocols: Link-state Routing Protocols use sophisticated algorithms that maintain a
complex database of internetwork topology.
OSPF
39. OSPF(Open Shortest Path First)
OSPF officially was documented in 1989 by the Internet Engineering Task Force (IETF) to address many
of the limitations of distance vector protocols, such as RIP and IGRP.
OSPF become the standard open routing protocol.
The word open is used because the algorithm that drives OSPF, Dijkstra's Shortest Path First (SPF)
algorithm, isn't proprietary to any vendor or organization.
This allows for mainframes such as IBM, Unisys, and DEC, as well as other manufacturers' routers, to
run OSPF.
FEATURES
• Fast convergence
• Support for VLSM, super netting, and summarization
• Support for large network diameters.
• Stub area routing— Large networks are supported because stub-area routing reduces the routing
table.
• Fully classless routing protocol
40. Commands
Router 1
Router(config)#router OSPF 100
Router(config)#Network 10.0.0.0 0.255.255.255 area 0
Router(config)#Network 192.168.1.0 0.0.0.255 area 0
Router 2
Router(config)#router OSPF 100
Router(config)#Network 10.0.0.0 0.255.255.255 area 0
Router(config)#Network 11.0.0.0 0.255.255.255 area 1
Router(config)#Network 192.168.2.0 0.0.0.255 area 0
Router 3
Router(config)#router OSPF 100
Router(config)#Network 11.0.0.0 0.255.255.255 area 0
Router(config)#Network 192.168.3.0 0.0.0.255 area 1
41. 3. Hybrid Routing Protocols: Hybrid Routing Protocols use a combination of distance-vector and link-state methods
that tries to incorporate the advantages of both and minimize their disadvantages.
EIGRP
Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance-vector routing protocol that is used on
a computer network for automating routing decisions and configuration.
• Maximum hop count =224
• Administrator distance=90
• Supports subnet+VLSM
Commands
Router(config)#Router EIGRP 500
Router(config)#network 11.0.0.0
Router(config)#No auto-summary
EIGRP
42. ACL
Access control lists (ACLs) provide a means to filter packets by allowing a user to permit or
deny IP packets from crossing specified interfaces.
(i) Extended ACL (Destination based)
Extended Access Control Lists (ACLs) allow you to permit or deny traffic from specific IP addresses to a
specific destination IP address and port. It also allows you to specify different types of traffic such as
ICMP, TCP, UDP, etc. Needless to say, it is very granular and allows you to be very specific.
Commands
Router (config)#access-list 100 deny tcp host ip 20.0.0.2 host 10.0.0.3 EQ 80
Router(config)#access-list 100 permit tcp any host 10.0.0.3 EQ 80
Router(config)#access-list 100 permit IP any any
Router(config)#interface fast Ethernet 0/0
Router(config)#ip access-group100 in
(ii) Standard ACL (Number based)
Commands
Router(config)#access-list N deny 20.0.0.2
Router(config)#access-list N permit any
Router(config)#interface Se0/0/0
Router(config)#ip access-group N in
43. (iii) Standard ACL (Name based)
Router(config)#IP access-list standard abc
Router(config)#deny 20.0.0.2
Router(config)#permit any
Router(config)#exit
Router(config)#interface Se0/0/0
Router(config)#ip access-group abc in
44. Switching is process to forward packets coming in from one port to a port leading towards
the destination.
VLAN
A local area network, or LAN, provides the nodes connected to it with direct (Layer 2) access to one another
45. Commands to create VLAN
Switch(config)#VLAN 2
Switch (config)#name Sales
To assign Ports in VLAN
Switch(config)#interface fastethernet0/1
Switch (config) #switch port mode access
Switch (config) #switch port access VLAN 2
VTP (Virtual Trunking Port)
VTP) is a protocol created by Cisco to create and manage VLANs for a large network with many interconnected
switches and to maintain consistency throughout the network.
A network switch, which is participating in VLAN Trunking Protocol (VTP), can have three different modes.
• Server Mode
• Client Mode
• Transparent Mode
46. PORT SECURITY
Method-I
Switch(config)#interface fastethernet 0/11
Switch(config)#switchport mode access
Switch(config)#switchport port security mac 21.13.8.1
Remove pc and again connect to give the following command
Switch(config)#interface fast Ethernet 0/11
Switch(config)#shutdown
Switch(config)#no shutdown
Method II
Switch(config)#interface fast Ethernet 0/11
Switch(config)#Switch port port-security
Switch(config)#switch port port-security mac-address sticky
Switch(config)#switch port port-security max-2
Switch(config)#switch port port-security violation shutdown
47. NAT
Network Address Translation (NAT) is the process where a network device, usually a firewall,
assigns a public address to a computer (or group of computers) inside a private network.
The main use of NAT is to limit the number of public IP addresses an organization or company must use,
for both economy and security purposes. The most common form of network translation involves a large
private network using addresses .
Types of NAT
1.Static NAT (Network Address Translation)
Static NAT (Network Address Translation) is one-to-one mapping of a private IP address to a public IP
address.
COMMANDS
Switch(config)#IP NAT inside source static 10.0.0.2 122.122.100.10
Switch(config)#IP nat inside source static 10.0.0.3 122.122.100.11
Switch(config)#interface fastethernet 0/0
Switch(config)#IP nat inside exit
Switch(config)#interface serial 0/0/0
Switch(config)#IP nat outside
48. 2.Dynamic NAT (Network Address Translation)
Dynamic NAT can be defined as mapping of a private IP address to a public IP address from a group of
public IP address.
COMMANDS
Switch(config)#interface fast Ethernet 0/0
Switch(config)#IP Nat inside
Switch(config)#exit
Switch(config)#interface serial 0/0/0
Switch(config)#IP nat outside
Switch(config)#exit
Switch(config)#access-list 10 permit 10.0.0.0 0.255.255.255.255
Switch(config)#IP nat pool abc 122.122.200.10 122.122.200.10 netmask 255.255.255.0
Switch(config)#IP Nat inside source list 10 pool abc
3. PAT (Port Address Translation)
Port Address Translation (PAT) is another type of dynamic NAT which can map multiple private IP addresses to a
public IP address by using a technology known as Port Address Translation.
49. Commands
Switch(config)#access-list 10 permit 10.0.0.0 0.255.255.255
Switch(config)#IP nat pool abc 122.122.200.20 122.122.200.20 net mask 255.255.255.0
Switch(config)#IP nat inside source list 10 pool abc overloads
Switch(config)#interface fast Ethernet 0/0
Switch(config)IP Nat inside
Switch(config)#exit
Switch(config)#interface serial 0/0/0
Switch (config)#IP Nat outside
50. Subnetting is a process of dividing large network into the smaller networks based on layer 3 IP address.
Every computer on network has an IP address that represent its location on network. Two version of IP
addresses are available IPv4 and IPv6.
Class A addresses range from 1-126
Class B addresses range from 128-191
Class C addresses range from 192-223
Class D addresses range from 224-239
Class E addresses range from 240-254
Subnet mask
Subnet mask is a 32 bits long address used to distinguish between network address and host address in
IP address. Subnet mask is always used with IP address. Subnet mask has only one purpose, to identify
which part of an IP address is network address and which part is host address.
51. Class Subnet Mask Format
A 255.0.0.0 Network.Host.Host.Host
B 255.255.0.0 Network.Network.Host.Host
C 255.255.255.0 Network.Network.Network.Host
52. A computer network or data network is a telecommunications network which
allows computers to exchange data.
In computer networks, networked computing devices exchange data with each other using
a data link. The connections between nodes are established using either cable
media or wireless media. The best-known computer network is the Internet.
Computer networks support an enormous number of applications and services such as access
to the World Wide Web, digital video, digital audio, shared use of application and storage
servers, printers, and fax machines, and use of email and instant messaging applications as well
as many others.
In most cases, application-specific communications protocols are layered (i.e. carried
as payload) over other more general communications protocols.
53. Textbooks:
[1] Goleniewski, L. (2006) Telecommunications Essentials, Addison Wesley Professional. )
[2 ]Kurose, J.F. and K.W. Ross (2003) Computer Networking: A Top Down Approach Featuring the Internet,
Addison Wesley. )
[3] Mir, N.F. (2006) Computer and Communication Networks, Prentice Hall.
[4]“Computer Networks” by Andrew S. Tanenbaum
[5] “Internetworking with TCP/IP, Volume 1” by Douglas Comer.
[6] Sam Halabi & Danny McPherson, Internet Routing Architectures.
[7 ]Christian Huitema, Routing in the Internet.
Research Papers:
[8][3ComWHITE] 3Com, "Understanding IP Addressing: Everything You Ever wanted to Know," White Paper,
May 2001.
[9][Cisco IP] Cisco, "Internet Protocols," Internetworking Technology Handbook.
[10][Cisco Routing] Cisco, "Routing Basics," Internetworking Technology Handbook.