IMPLEMENTATION OF NETWORK ARCHITECTURE
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
-security issues in computer network architecture volume2,no-7 july 2011 Dr M.Lilly Florence, Dr D Swamydas
-introduction to system and network security ,learning tree internation technology training vol 468 meterial
-“a better model for generating test networkingâ€in proceedings of globecom by J.M DOAR
-CISCO-SYSTEM INC,â€network security and executive overviewâ€
http://www.managednetwork.com/doc/network
-Network Architecture and Security Issues in Campus Networks, Mohammed Nadir Bin Ali, Fourth International
Conference on Computing, Communications and Networking Technologies (ICCCNT) 2013:
-Design and Implementation of a secure campus network volume 5, Issue-7 July, 2015,’ Mohammad Nadir Bin Ali, Mohammad Imran Hussain, Mohammad Masud Parvez;
- Chappell, L. A. and Hakes, D. E. (1994). Novell’s guide to NetWare LAN analysis. 2nd ed. Alameda, CA: SYBEX Inc;
- Comer, D. E. (1995). Internetworking with TCP/IP, volume I:
Principles, protocols, and architecture. 3rd ed. Upper Saddle
River, NJ: Prentice Hall, Inc.
- Derfler, F. J. and Freed, L. (1996). How Networks Work.
nd ed. Emeryville.
- Martin, J., Chapman, K. K., & Leben, J. (1994).
Local area networks: Architectures and implementations.
nd ed. New Jersey: P T R Prentice Hall, Inc.
- CCNA Routing and Switching, 2013 cisco systems Mega
Guide, CCNA 640-802, www.preplogic.com.
- Roese, J. (1998) Switched LANs: Implementation, operation, maintenance. New York: McGraw-Hill, Inc
- Virtual LAN communications. (1996). [online].
Available: http://cio.cisco.com/warp/public/614/13.
html. (October 22, 1998) .
- VLAN information. UC Davis Network 21. (1998). [online]. Available: http://net21.ucdavis.edu/newvlan.html. (October 21, 1998)
-.www.goggle map.com