+1-415-670-9189
info@expertsmind.com
Find the network diameter
Course:- Computer Networking
Reference No.:- EM13830142




Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Computer Networking

Question:

You have a total of six switches, with each switch containing eight ports. One port on each switch can be configured for straight-through or crossover operation.

Show one way to connect all six switches and indicate the number of computers that can be connected

Develop a different way to connect the switches and count the number of computers again. Does one topology give better results than the other?

For both solutions, assuming that 100 meter UTP cables are used between each switch and from switch to computer, find the network diameter.

Answered:-

Verified Expert


Preview Container content

Introduction:

The limitation of the topology shown in figure 1 can be overcome by rearranging the connections of the switches. The improved topology is represented in figure 2. In this topology the switches are not connected to each other. One switch is the master switch and others are connected to the switch.

The switch s1 is connected to 3computers and other ports of s1 are used to connect other switches. The switchess2 to s6 use one port to connect to master switch and seven ports to connect to computers.

The total number of computers connected is 38. This topology is better than the topology shown in figure 1. This topology is more reliable and fault tolerant than the previous one. The performance is better here.




Put your comment
 
Minimize


Ask Question & Get Answers from Experts
Browse some more (Computer Networking) Materials
What is a network topology? List and define at least three examples of network topologies. List and define the types of System Software. How does System Software differ from
In this task, you need to demonstrate how the ARP cache poisoning attack work. Several commands can be useful in this task. In linux we can use command arp to check the curr
How would one define the s-t cut on node capacitated network as opposed to the edge capacitated network, and how would one illustrate that analogue.
Cathi required to network three computers for herself and her roommates, Sharon and Emily. She decided that a(n) (1)___________________ network was the right kind to install
List five nonproprietary Internet applications and the application-layer protocols that they use. What information is used by a process running on one host to identify a proce
What is meant by a protocol? List and describe the most common protocol suites. List and describe the common protocols in the Transmission Control Protocol/Internet Protocol (
they want the routing information of all four networks to be available at each site, so that any employee can go to any site, and work from them, and they are worried about
What is the entropy associated with the statement that John makes to Jane? - What is the general formula for entropy Hb(S) using base-b logarithms in terms of entropy Ha(S) us