Create a basic diagram that depicts a star network topology

Assignment Help Computer Networking
Reference no: EM131041870

You were selected to design a small peer-to-peer network for a new facility which has six computers and a networked printer. Each desk computer must have a wired network connection as well as wireless access for mobile devices. Using the Gliffy (Links to an external site.) software, create a basic diagram that depicts a star network topology with a switch as the central communications node. The focus here is on the network communications equipment for this LAN so include only that equipment and end nodes on the network. There is no need to draw out the physical space.

Once you are complete with the diagram write out a 3-4 paragraph description of your design. Explain how the hardware is connected, what cable media is used, etc. State any assumptions you've made about the kind of work being done, the demands the people in the office will put on the network or how they'll use it, and how that influenced your design. For example, if this is a small streaming video-based news service, they probably need more performance from the network and their ISP than a small rental property management office might.

Requirements:

Depict a star topology in the diagram

Position the central hardware network communications device that enables end nodes to connect to the network (switch)

Include hardware devices that:

connect your network to other networks (router)

connect your LAN to the ISP (modem)

connect devices to the LAN via wireless (wireless router)

for this activity use a separate hardware unit for each element; do not use combination devices such as a modem/router or router/switch

Specify internet connection via service provider (cable, fiber, dial-up?)

Include six (6) end nodes (desktop computers) and the networked printer

Note the type of cable media used between the switch and end nodes (be specific)

Label all items (brand and model names are acceptable but not required)

Save your diagram as an image (.jpg or .jpeg) and insert this image into your Word document with the written description

Optional:

Detail a security solution. Is this a hardware firewall, software, or both?

Diagramming software:

Gliffy: https://www.gliffy.com/ (Links to an external site.)

Use network images: to access, select More Shapes (bottom left menu) > Network > Business

Gliffy User Manual.

Reference no: EM131041870

Questions Cloud

Bank evaluation process : Assume that you are nearing graduation and have applied for a job with a local bank. The bank's evaluation process requires you to take an examination that covers several financial analysis techniques. Use the following information for Questions 1..
Optimal order quantity and associated annual total cost : Suppose that your company supplies toothpaste to Wal-Mart, and they are your only customer. Wal-Mart orders its EOQ of 1,000 tubes each time they order. The annual demand for these tubes is 40,000 units. Your setup cost is $100 per order, and your an..
Developing product-about new products relative advantage : When developing products, what does the term relative advantage mean? Explain why management teams should be concerned about a new product’s relative advantage.
Create a portfolio with an expected return : Your choices are Stock X with an expected return of 11 percent and Stock Y with an expected return of 8.0 percent. If your goal is to create a portfolio with an expected return of 9.59 percent, how much money will you invest in Stock X and Stock Y..
Create a basic diagram that depicts a star network topology : Create a basic diagram that depicts a star network topology with a switch as the central communications node. The focus here is on the network communications equipment for this LAN so include only that equipment and end nodes on the network.
Contrast assembly customization with design customization : Compare and contrast assembly customization with design customization. Why are efforts to maintain barriers to existing or new competitors using assembly customization of limited effectiveness?
Draw a design of a cloud based system for storing : SIT113 - Cloud Computing and Virtualisation Trimester Assignment. Draw a design of a cloud based system for storing, accessing, updating, processing, securing, sharing, and publishing S-mart data and information
How is corporate eventuring used as an aid : How is corporate eventuring used as an aid to search for innovation opportunities? Explain the relationship of the organization’s strategic plan and vision statement to the corporate venturing methodology.
Evaluate nike roshe function nm laser : Currently most of us obtain a better evaluate that Nike Roshe Function NM Laser. Supplied throughout not one but two incredible shades involving black/white plus all-white.

Reviews

Write a Review

Computer Networking Questions & Answers

  Common network for all onboard systems

This module item is similar to the previous case study. You need to analyze and study the subject presented below and compose a report answering the questions posed.

  Determine maximum size of set l-tcp sequence number

Determine the maximum size of set L such that TCP sequence number doesn't run out? Remember TCP sequence number field size is 4 bytes.

  Describe wi-fi and telecommuting

Describe Wi-Fi and telecommuting. What are the issues associated with allowing this technology to access the organization's network? Do you see either as being applicable for your selected organization

  Write a three-page summary a successful penetration test

Using MS Word, write a three-page summary describing a successful penetration test. What penetration tools and techniques do you feel would be needed in a successful penetration test?

  A flip-flop is a circuit that serves to store a single bit.

Nonmetals such as carbon and oxygen tend to be good conductors of electricity.

  Describe and explain denial of service

Describe and explain Denial of Service (DoS) and Distributed Denial of Service (DDoS) network attacks

  Why are protocols important for networking

Why are protocols important for networking. How does SSH differ from Telnet? How does HTTPS differ from HTTP

  Why does http at the application layer uses tcp

Why does HTTP at the application layer uses TCP while DNS uses UDP when it passes its message packet with overhead to the Transport Layer and then hand it off to the Network Layer?

  Explain why it is recommended to secure windows

You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO has asked you to explain why you recommend it is so important to secure your Windows.

  A company is interested in upgrading its current core

a company is interested in upgrading its current core infrastructure which comprises 2 100mbps switches which connect

  1 what you understand about compatibility in network

1. what you understand about compatibility in network architecture? brief explain.2. explain which topology suits the

  Computer network design for the new building

Write a paper on Computer Network Design for the University’s New Building,  The Integration of the Subnets on the University’s building

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd