Professional Documents
Culture Documents
Industrial Training Report: Department of Electronics & Telecommunications Engineering
Industrial Training Report: Department of Electronics & Telecommunications Engineering
Submitted By Submitted To
Bashir Ahammad Zabir Engr. Syed Zahidur Rashid
Matric ID: T163014 Chairman and Assistant Professor
Course Name: Industrial Training Department of Electronic and Telecommunications
Course Code: ETE-4804 Engineering International Islamic University Chittagong
1
Candidate Declaration
It is declared clearly that any part of this report is not shared anywhere for award this degree.
Chapter: 05 Conclusion
Server Visit…………………………………………………………35
Conclusion……………………..…………………..……………….37
References………………..…………………..…………….……...38
Abstract
Industrial training refers to the improvement, while still earning a specific degree, of practical skills
and first-hand industry experience related to a career. Industrial Training's primary objective is to
introduce students to the real working world and to improve their knowledge and skills from what
they have learned at college. Another ambition of this initiative is to ensure that honesty,
transparency and self-confidence are always good qualities. Students must respect all ethical
principles and good working practices. It is also to assist students in the safety practices and
regulations within the industry and in the sense of cooperation and good partnership between
students and staff.
Industrial training offers students with an opportunity to access practical experience employed in
the relevant field. Industrial training can be characterized as pre-graduation work experience that
is compatible with professional growth. The aim of industrial training is to be intimate with the
sector in question and to receive a certificate for potential records. It grants the student to learn
with various individuals about manners and attitudes, punctuality, transparency and cooperation.
It grants a graduate to technically manage material, installation and working processes at the
industry level.
Company Approval and Company Information (Candidate Attendance Sheet with Verified Signature by Trainer)
Company Information
Trainer Information
Engr. Ariful Islam
. Digital Dot Net
7
Acknowledgement
First and foremost, I'd like to express my gratitude to Almighty Allah (SWT), the Lord of the
Universe, for providing me with the opportunity to write this report. Then I'm sending Darood to
Mohammad, his beloved Prophet (PBUH). Mr. Syed Zahidur Rashid, Honorable Chairman of
our ETE Department, and Mr. Abu Zafar Mohammad Imran Sir, a member of the Industrial
Training Committee, are two people I'd like to thank. Our graduation is on the verge of being
postponed due to their hasty decision to schedule an Industrial Training course evaluation. I
would like to thank the former Chairman Mr. Mohammed Jashim Uddin Sir and our batchmate
Md. Arifur Rahman. We have got the opportunity to do industrial training in DDN Bangladesh
for quick permission, smooth completion of various official works of Mohammed Jashim
Uddin Sir and overall efforts of Mohammad Salahuddin.
8
Establish to the Company
❖
Company Overview:
Digital Dot Net (DDN) is South-east Zone Licensed ISP and IT related services and solutions
provider. DDN was formed in June 2004. DDN shown the fastest growth and attained a high
level of customer confidence to become the preferred and the leading ISP in Chattogram.
This milestone has been achieved through a focused and dedicated approach to give an
efficient and unmatched level of customer support. After that DDN has introduced various
services one after one which made DDN is the most excellent ISP & IT enable service
provider in Chattogram. DDN has deployed a high-quality backbone of network
infrastructure consisting of a Wide Area Network (WAN) and City-wide optical fiber that
can deliver communication solutions. DDN has a client that extends through 12 districts and
celebrates the spirit of diversity to the heart. Over the years, this network has been
continuously strengthened and expanded to comply with our ambition of expanding our
outreach and accessing our services to clients located at various strategic points.
7
Chapter 01
IIG Overview in Bangladesh
1.1 IIG
An International Gateway is a phone number that routes calls in order to access lower
international long-distance rates[1] or to make international calls over voice over IP
(VOIP) networks. They are also successful in making an international call to the United
States look as if it originated from a local number rather than the actual venue.
While there are various legitimate applications, scammers and con artists of all kinds,
ranging from foreign fraudsters to lottery fraud and bogus money order overpayment
fraud, often use them. The caller ID will show the call on some occasions as INTL
GATEWAY; anonymous or unknown at other times. It will always look as if it is a
disconnected number if you call the number back. Using several websites on the Internet,
unknown phone numbers can be studied. [2]
The few main operators of the International Internet Gateway (IIG) are:
\
SI OPERATOR NAME ADDRESS LICENSE NO. ISSUE DATE
1 Coronet Corporation Ltd 95, Kazi Nazrul Islam Avenue, BTRC/LL/201234/IIG(34)Coronet Apr 12 2012
1st Floor, KawranBazar, Dhaka-
1205
2 Novo Com Limited Konabari, Neelnagar, Gazipur BTRC/LL /IIG(33)Novo com2012-33 Apr 12 2012
3 Velocity Networks Limited Paragon House, 1st Floor, 5 BTRC/LL /IIG (30) Equitel /2012-30 Apr 12 2012
Mohakhali C/A Dhaka -1212
4 Summit Communications Ltd 18 Kawran Bazar C/A, Dhaka- BTRC/LL/IIG(17)Summit/2012-17 Apr 12 2012
1215
5 Rego Communications Ltd H-43, R-2A, Dhanmondi, Dhaka- BTRC/LL/IIG(14)Rego/2012-14 Apr 12 2012
1209
IIG providers mostly represent the country's ISPs, airlines, and large corporations.
On an international and local internet, they use robust transit and peering.
Customers can subscribe to bandwidth dependent on their traffic destination with
these operators. Their aim is to lower network traffic congestion and keep latencies as
low as possible.
9
Chapter 02
ISP Provider Overview
An Internet Service Provider is a business or company that enables the World Wide Web
to be linked to your computer. This offers connections to one or more high-speed Internet
lines for clients. An ISP can also give other services, such as web hosting and rental
services for digital storage space, and software access, among others. In terms of
bandwidth and coverage, ISPs compete with each other, which grants them to give the
best signal and transmission speed. An ISP can be likened to a water tap. There is water
running through the main drain, but unless you add a faucet, you can't get any.
An ISP makes accessing the Internet possible. Most ISP invest in miles of cables, build
suitable infrastructure, and employ knowledgeable technicians to give consumers with a
wide variety of Internet connection service packages that suit their personal and business
requirements.
In the past, only three forms of networks were delivered by ISP, dial-up, broadband cable
and wireless subscriber line. Due to sluggish access, even though it was highly
affordable, dial-up services were scarce, if not outdated. These are the various types of
ISP choices you can choose from so far:
1. Satellite
Satellite Internet access is an alternative that is often served in lieu of dial-up service to
those living in remote areas. However, it has a drawback, as it needs substantial
investment by the ISP in the infrastructure.
10
Satellite
2. DSL
The DSL connection grants use of current landline telephones in the homes of customers.
When linked to the Internet, they can still make and receive phone calls. This form of
connection grants users without high material costs to enjoy average-speed internet
access. Just consumers need to purchase a modem. The speed depends on how far from
the nearest switching station a customer is from.
3. Broadband Cable
Usually, providers of cable TV services give broadband cable access. Depending on the
number of users served at a given time, the connection speeds also differ. Note that the
speed of access often depends on the geographical area of a customer. The more users in
a given region there are, the slower the link is because they share bandwidth.
11
4. Fiber-Optic Cable
Perhaps the fastest and highly preferred form of Internet service ISPs give today is fiber-
optic connectivity. As it is relatively new, ISPs must first lay the groundwork for the
operation. Serviceable areas, as such, remain small. However, a monthly fiber-optic
service subscription does not cost any more than both DSL and broadband cable
connections in terms of price.
5. Wi-Fi Broadband
Another way of providing connectivity is Wi-Fi broadband. It grants for more flexibility
for multiple users to access the Internet. Users are free to switch about and remain
connected, since they don't have to stay connected to a modem. With a pocket Wi-Fi
system that gives them the ease of taking connectivity everywhere they go, most
customers do that. It depends on the needs and availability of users to select the right kind of
Internet service. Consumers must also ensure that the connection to which they subscribe
is secure.
2.2 Intranet
12
Fig2.1: An internet configuration [5]
A company-wide intranet can constitute an important focal point of internal
communication and collaboration, and give a single starting point to access internal and
external resources. In its simplest form, an intranet is established with the technologies
for local area networks (LANs) and wide area networks (WANs).[2][3][4] Many modern
intranets have search engines, user profiles, blogs, mobile apps with notifications, and
events planning within their infrastructure.
2.3 Internet
The Internet is a vast network linking computers around the globe. Via the Internet, people
with an Internet connection can exchange information and communicate from anywhere. The
internet is the larger network that enables corporations, governments, universities and other
organizations to speak to each other about computer networks around the world. The effect is
a mass of cables, computers, data centers, routers, providers, repeaters, satellites and wi-fi
towers that grant the world to move with digital information. You can order the weekly store,
post your life on Facebook, watch Outcast on Netflix, email your aunt in Wollongong, and
check the web for the tiniest cat in the world.
BDIX is Bangladesh's very first Internet Exchange Point. It was founded to give its
members with physical interconnection to exchange and route local Internet traffic
through it locally. Over 130 different types of organizations are currently peering via
BDIX. Like most other IXPs of the world BDIX is run with membership fees paid by the
connected members, and are operated for the benefit of the members and the Internet
community at large. For its financial operations members pay a monthly or annual fee,
usually determined by the speed of the port or ports which they are using. SDNF is a
transformed body of the Sustainable Improvement Networking Program, a project
initiated by the Bangladesh Sustainable Environment Management Program of the
United Nations Improvement Program and implemented by the Bangladesh Institute of
Improvement Studies. Since 2004, BDIX has been working to improve Internet
infrastructure in Bangladesh by supporting the intercommunication between different
ISPs in the country. It also assists its improvement in several ways.
2.5 FTP
The File Transfer Protocol (FTP) is a standard Internet protocol for transferring files over
TCP/IP connections between computers on the Internet. FTP is a client-provider protocol
where a client asks for a file and it is supported by a local or remote provider. The end-
user computer is commonly referred to as the local host machine, connected to the
remote host through the internet, which is the second machine running the FTP program.
Anonymous FTP is a form of FTP that grants users, without having an ID or password,
to access files and other data. Some websites grant guests to use a guest ID or password-
this is granted through anonymous FTP.[5] Though a lot of file sharing is now done
using HTTP, FTP is also widely used by other applications to transfer data behind the
scenes—e.g., concealed behind banking user interfaces, a tool that helps create a website,
such as Wix or Square Room, or other services. It is also used for downloading new
applications via Web browsers.[5]
14
FTP is a client-provider protocol that relies on two client-provider communication
channels: the conversation control command channel and the file information
transmission data channel. A client is able to upload, download, remove, rename,
transfer, and copy files to a provider using FTP. FTP sessions work in passive or active
modes. In active mode, after a client initiates a session via a command channel request, the
provider initiates a data connection back to the client and begins transferring data. In passive
mode, the provider instead uses the command channel to send the client the information it
needs to open a data channel. Because passive mode has the client initiating all
connections, it works well across firewalls and Network Address Translation (NAT)
gateways.
We may assume that your automated postal service is an email provider. It is a computer
or software responsible for managing messages. So, when you send an email, your
message usually goes through a series of email providers until it reaches the recipient.
The process is so quick and effective that it seems straightforward, but sending and
receiving emails is very complex.
Sometimes an email provider can mean a computer or a machine that has a complete
system that includes different services or applications. 15
Email provider forms.
o SMTP.
o POP3.
o IMAP.
2.8 SMPT Provider
The address (or addresses) of the SMTP provider can be set by the mail client or program
you're using, and is normally formatted as smtp.provideraddress.com. (For example,
smtp.gmail.com is Gmail's SMTP provider address, and smtp.sendgrid.com is Twilio
SendGrid's. Usually, you will find your SMTP provider address in your mail client's
account or settings section.)
The SMTP provider processes your email when you send an email, decides which
provider to send the message to and relays the message to that provider. The inbox
service provider of the recipient, such as Gmail or AOL, then downloads the message and
brings it into the inbox of the recipient.
Improving performance
Translation
Accessing services anonymously
16
Security
Monitoring and Filtering
Content Filtering
Filtering encrypted data
Bypass filters
Logging and eavesdropping
Improving performance
It fastens the service by retrieving content from the cache process that was saved when
the client made the previous request.
18
Translation
By excluding source content or substituting source content with original local content, it
helps to configure the source site for local users. The source website receives traffic from
international users via Translation Proxy.
Security
Since the proxy provider conceals the user's identity, it also protects against spam and
attacks by hackers.
2.10 MRTG
The Multi Router Traffic Grapher (MRTG) is a free program for tracking and traffic load
calculation on network connections. It grants the user to see the load of traffic in
graphical form on a network over time. It was originally created to track router traffic by
Tobias Oetiker and Dave Rand, but it has grown into a tool that can generate graphs and
statistics for almost anything. MRTG runs on Windows, Linux, Unix, Mac OS and
NetWare and is written in Perl.
17
The Domain Name System (DNS) is a hierarchical and decentralized system for the
classification of computers, utilities or other Internet-connected or private network
resources. It associates different data with the domain names assigned to each of the
organizations involved. Most notably, it converts more readily stored domain names to
the numerical IP addresses necessary for computer services and devices with underlying
network protocols to be located and recognized. The Domain Name System has been an
integral element of the functionality of the Internet since 1985 by offering a worldwide,
distributed directory service.[7]
By designating authoritative name providers for each domain, the Domain Name System
assigns the task of assigning domain names and mapping those names to Internet resources.
19
Network administrators can delegate authority to other name providers over the sub-
domains of their allocated name space. This mechanism offers a distributed, fault-tolerant
service and was designed to prevent a single large central database from being used.
The technical functionality of the database service at its heart is also specified in the
Domain Name System. It specifies, as part of the Internet Protocol Set, the DNS protocol,
a comprehensive specification of the data structures and data transmission exchanges
used in the DNS.
The Internet maintains two principal namespaces, the domain name hierarchy[1] and the
Internet Protocol (IP) address spaces.[5] The Domain Name System maintains the
domain name hierarchy and gives translation services between it and the address spaces.
Internet name providers and a communication protocol implement the Domain Name
System.[3] A DNS name provider is a provider that stores the DNS records for a domain;
a DNS name provider responds with answers to queries against its database.
`16
Chapter 03
OSI Model Layer
In any number of sets, a record can function as an owner, and in any number of sets, a
member. With the aid of circular linked lists, a set is designed where one type of record, the
owner of the set also called as a parent, appears once in each circle, and a second type of
record, also known as the subordinate or infant, may appear in each circle several times.
• It can more accurately reflect redundancy in data than in the hierarchical model.
• There can be more than one path from a previous node to successor node/s.
• The network model operations are maintained by a linked list (circular) indexing
structure where a program maintains a current location and navigates from one
record to another by following the relationships in which the record participates.
• Records can be found by including key values as well.
A network model is illustrated in the following diagram. Many clients are served by an
agent and many entertainers are handled. Each customer schedules any number of
engagements for his or her services and makes payments to the agent. Each entertainer
performs many activities and can play a number of styles of music.
19
Fig3.1: A network model[7]
A node defines a record set, and a fixed structure aids in the formation of a network
relationship. By using one node as an owner and a member of the other, this creation aids
in the connection of two nodes.
A fixed structure manages a one-to-many relationship, which means that one or more
records in the member node can be linked to a record in the owner node, but only one
record in the owner node can be linked to a single record in the member node.
Furthermore, a record in the member node cannot exist unless it is linked to an existing
record in the owner node. A client may be assigned to an agent, for example, but the
database can always show an agent with no clients.
20
Fig3.2: basic set structure of network model[4]
A diagram of a fundamental set structure is shown in the diagram above. One or more
sets (connections) can be established between a specific pair of nodes, and other sets with
other nodes in the database can also include a single node.
With the help of an acceptable set structure, the data can be easily accessed within a
network model. There are no constraints on selecting the root node, you can access the
data from any node and use similar sets to run backwards or forward.
Advantages
• fast data access.
• It also enables users to generate more complicated queries than those they have
generated using a hierarchical database. So, this model can be run through a
number of queries.
Disadvantages
21
• A user must be very intimate with the structure of the database to work through
the set structures.
• Inside this database, upgrading is a boring job. Without affecting the application
programs that use this structure to navigate through the data, one can not alter a
fixed structure. You must also alter all references made from within the
application software to that structure if you change a fixed structure.
22
The four layers that make up the TCP/IP reference model are discussed below:
Layer 1: Host-to-network Layer
• It is a layer all of them.
• Protocol is used to establish a connection with the host and send packets over it.
• Varies from network to network and host to host and.
• The internet layer is the selection of a packet switching network that is based on a
connectionless internetwork layer.
• The layer is that keeps the whole system together.
• It helps the packet to travel independently to the destination.
• The order in which packets arrive varies from the order in which they were sent.
• In this layer, IP (Internet Protocol) is used.
• The Internet Layer performs the following functions:
o Delivering IP packets
o Performing routing
o Avoiding congestion
Layer 3: Transport Layer
• It defines whether data should be transmitted in parallel or in a single direction.
• The transport layer performs functions such as segmenting, multiplexing and
splitting on data.
• The applications have access to the transport layer and can read and write to it.
• The header information is added to the data by the transport layer.
• The transport layer divides the message (data) into smaller units so that the
network layer can handle it more efficiently.
• In addition, the transport layer arranges the packets to be sent in order.
23
TELNET is a two-way communication protocol for connecting to and running
applications on a remote computer.
FTP (File Transfer Protocol) is a network-based file transfer protocol. It's
dependable, transparent, and efficient.
SMTP (Simple Mail Transport Protocol) is a protocol for transporting
electronic mail through a route between a source and a destination.
For Hosts linked over a network, DNS (Domain Name Provider) resolves an
IP address into a textual address.
• It helps peer entities to interact with one another.
• It defines two end-to-end protocols: TCP and UDP
TCP (Transmission Control Protocol): It is a reliable connection-oriented
protocol which handles byte-stream from source to destination without error
and flow control.
Demerits of TCP/IP
o The transport layer does not guarantee packet delivery in this situation.
o There is no way to use the model in any other application.
o Replacing protocol is not easy.
o Its programs, interfaces, and protocols have not been clearly differentiated.
24
3.4 OSI model
OSI or Open System Interconnection model was improveed by International Standards
Organization (ISO). It gives a layered networking framework that conceptualizes how
communications should be done between heterogeneous systems. It has seven
interconnected layers. The seven layers of the OSI Model are a physical layer, data link
layer, network layer, transport layer, session layer, presentation layer, and application
layer, as shown in the following diagram –
o Physical Layer − Its aim is to transfer individual bits over a physical medium from one
node to another.
o Data Link Layer − It is responsible for efficiently transferring data frames connected by
the physical layer from one node to another.
o Network Layer − It regulates the transmission of individual data packets from source to
destination by properly addressing and routing them.
o Transport Layer − It is responsible for the transmission to the destination host of the
entire message from the source host.
25
o Session Layer − It creates user sessions and gives services such as dialog control and
synchronization.
o Presentation Layer − By means of translation, compression, and encryption, it tracks the
syntax and semantics of transmitted content.
o Application Layer − It gives users with high-level (application program interface) APIs.
o It is a generic model and gives as an instrument for designing any network model as a
reference.
o It is a model that is layered. Changes are not influenced by other layers on one layer,
served that the interfaces between the layers do not shift significantly.
o It distinguishes services, interfaces, and protocols distinctly. Hence, in nature, it is
versatile. Depending on the design of the network, protocols in each layer may be
substituted quite easily.
o Both connection-oriented services and connectionless services are served.
o It is simply a theoretical model that does not take the availability of suitable technologies
into account. This limits its realistic execution.
o This model's launch timing was unacceptable. The TCP/IP protocols were already
implemented when OSI emerged. So, at first, the businesses were hesitant to use it.
o The OSI model is very intricate. Cumbersome, sluggish and expensive was the initial
implementation.
o Although there are several layers, when practically deployed, some layers such as the
session layer and presentation layer have very little functionality.
o In separate layers, there is a duplication of resources. Multiple layers give services
including addressing, flow control and error control.
o The OSI model standards are theoretical and do not give appropriate solutions for the
implementation of functional networks.
o After being introduced, both the functional needs and the TCP/IP model were not
addressed by the OSI model. It was therefore labelled as of poor quality.
26
o The academy liked the TCP/IP model very much. OSI was assumed to be a result of the
European communities and the US government, which tried to compel researchers and
programmers to follow an inferior model. There was, therefore, some opposition to it
being accepted.
o IP Protocol: In this layer, the IP protocol is used, and it is the most critical part of
the whole TCP/IP suite.
o Fragmentation and Reassembly: The limit imposed by a data link layer protocol on
the size of the IP datagram is known as the Maximum Transmission Unit (MTU). If
the IP datagram size is larger than that of the MTU unit, then the datagram is broken
into smaller units by the IP protocol so that they can pass across the local
network. The sender or intermediate router may do fragmentation. All the pieces
are reassembled on the receiving side to form an initial message.
o Routing: It is known as direct delivery when IP datagrams are sent over the same
local network, such as LAN, MAN, WAN. The IP datagram is indirectly sent
when the source and destination are on the remote network. Routing the IP
datagram via various devices such as routers will accomplish this.
ARP Protocol
27
• The two terms are mainly associated with the ARP Protocol:
o ARP request: It broadcasts the ARP request to the network when a sender wants to
know the physical address of the system.
o ARP reply: The ARP request is acknowledged and processed by any computer
connected to the network, but only the receiver recognizes the IP address and
sends back its physical address in the form of an ARP reply. The receiver attaches
both its cache memory and the datagram header to the physical address.
ICMP Protocol
o ICMP Test: The ICMP test is used to test whether or not the destination can be reached.
o ICMP Reply: ICMP Reply is used to verify whether or not the destination system
responds.
The ICMP protocol's core obligation is to report, not correct, the issues. The
responsibility rests with the sender for the correction.
ICMP can only send messages to the source, but not to the intermediate routers, since the
IP datagram holds the source and destination addresses, but not the router to which it is
transferred.[4]
28
Chapter 04
Internet Component
4.1 Router
On computer networks, a router sends and receives data. Routers are sometimes confused
with network hubs, modems, or network switches. However, routers can combine the
functions of these components, and connect with these devices, to improve Internet
access or help create business networks.
Routers guide and direct network data, using packets that contain various kinds of data—
such as files, communications, and simple transmissions like web interactions. The data
packets have several layers, or sections, one of which carries identifying information such
as sender, data type, size, and most importantly, the destination IP (Internet protocol)
address. The router reads this layer, prioritizes the data, and chooses the best route to use
for each transmission.[3]
A common tool for modern network computing, routers connect employees to networks,
both local and the Internet, where just about every essential business activity takes place.
Without routers, we wouldn't be able to use the Internet to collaborate, communicate, or
gather information and learn.
Routers can also give security. Embedded firewall and content filtering software give an
additional protection from unwanted content and malicious websites without affecting
your online experience.
A router isn't just for data transmission or Internet connections, though. Most routers
grant you to connect hard drives and use them as file-sharing providers, or printers that
can then be accessed by anyone on the network. 29
Switch
Switches are network devices running on Layer 2 or on the OSI model's data link layer.
Network devices are connected and packet switching is used to transmit, receive or
forward data packets or data frames over the network.
There are several ports on a switch that are plugged into computers. When a data frame
arrives at any port of a network switch, the destination address is checked, the necessary
checks are carried out and the frame is sent to the corresponding device (s). Unicast,
multicast, and broadcast communications are served.
Features of Switches
o A switch operates in the layer 2, data link layer of the OSI model.
o It is a smart network system that can be conceived as a bridge for a multiport
network.
o To send data packets to selected destination ports, it uses MAC addresses
o It uses the technique of packet switching to receive and forward data packets from
the source to the target device.
o It is supports unicast (one-to-one), multicast (one-to-many) and broadcast (one-to-
all) communications.
o The mode of transmission is full duplex, and contact in the channel takes place
simultaneously in both directions. Collisions do not occur due to this.
o Switches are active devices, equipped with network software and network
management capabilities.
o Switches can perform some error checking before forwarding data to the destined
port. 30
o The number of ports is higher – 24/48.
Converters
2. Enterprise
3. Security and Surveillance
4. Conversion of speed.
32
4.4 OTDR
Types of OTDR
1. Full-feature OTDR
3. RTU in RFTSs
33
4.5 Fusion Splicer
The act of joining two optical fibers end-to-end is known as fusion splicing. The aim is to
fuse the two fibers together so that light passing through the fibers is not dispersed or
reflected back by the splice, and the splice and surrounding area are almost as powerful
as the intact fiber. The heat source used to melt and fuse the two glass fibers being
spliced is normally an electric arc, but it may also be a laser, a gas flame, or a current-
passing tungsten filament. As previously said, a fusion splicer is a system that joins two
optical fibers together by welding (fusing). Fusion splicing is the term for this procedure.
On the fusion splicer, the fiber ends are prepared, cleaved, and put in alignment fixtures.
34
Server Visit
35
36
Conclusion
We have gathered a lot of practical information about the communication side of this
training. The basic aspect of the ISP market is also known to us.
37
References
[1] Luk, A. (9 May 1991). "Fujikama goes Unix". IEEE Pacific Rim Conference on Communications,
Computers and Signal Processing, 1991. Institute of Electrical and Electronics Engineers. 2: 783–786.
doi:10.1109/PACRIM.1991.160857. ISBN 978-0879426385. The internet and intranet Unix network give a
functioning email facility around the world.
[2] Callaghan, J (2002). Inside Intranets & Extranets: Knowledge Management AND the Struggle for Power.
Palgrave Macmillan. ISBN 0-333-98743-8.
[3] RFC 781, Internet Protocol - DARPA Internet Program Protocol Specification, Information Sciences
Institute, J. Postel (Ed.), The Internet Society (September 1981).
[4] 5.2 RM description for end stations". IEEE Std 802-2014, IEEE Standard for Local and
Metropolitan Area Networks: Overview and Architecture. ieee. doi:10.1109/IEEESTD.2014.6847097. ISBN 978-
0-7381-9219-2.
[5] Davies, Howard; Bressan, Beatrice (26 April 2010). A History of International Research Networking: The
People who Made it Happen. John Wiley & Sons. pp. 2–3. ISBN 978-3-527-32710-2.
[6] Roberts, Dr. Lawrence G. (November 1978). "The Evolution of Packet Switching" (PDF). IEEE Invited
Paper. Retrieved 10 September 2017.
[7] Walter Goralski. The Illustrated Network: How TCP/IP Works in a Modern Network (PDF). Morgan
Kaufmann. p. 26. ISBN 978-0123745415.
38