+1-415-670-9189
info@expertsmind.com
Find the network diameter
Course:- Computer Networking
Reference No.:- EM13830142




Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Computer Networking

Question:

You have a total of six switches, with each switch containing eight ports. One port on each switch can be configured for straight-through or crossover operation.

Show one way to connect all six switches and indicate the number of computers that can be connected

Develop a different way to connect the switches and count the number of computers again. Does one topology give better results than the other?

For both solutions, assuming that 100 meter UTP cables are used between each switch and from switch to computer, find the network diameter.

Answered:-

Verified Expert


Preview Container content

Introduction:

The limitation of the topology shown in figure 1 can be overcome by rearranging the connections of the switches. The improved topology is represented in figure 2. In this topology the switches are not connected to each other. One switch is the master switch and others are connected to the switch.

The switch s1 is connected to 3computers and other ports of s1 are used to connect other switches. The switchess2 to s6 use one port to connect to master switch and seven ports to connect to computers.

The total number of computers connected is 38. This topology is better than the topology shown in figure 1. This topology is more reliable and fault tolerant than the previous one. The performance is better here.




Put your comment
 
Minimize


Ask Question & Get Answers from Experts
Browse some more (Computer Networking) Materials
Create a network infrastructure design for a banking corporation for their new setup in Australia for this we have to create network topology diagram for WAN network and Loc
Explain OSI model and how it relates to network in 200 to 300 words. Your response should include answers to following: On which layers of OSI model do WAN protocols operate
Write a two-and-a-half-page paper describing the components that make up a network management system (manager, agent, MIB, RMON, probe, etc.), along with their functions
You are required to choose an infrastructure model that you think will achieve the DTGOV Roadmap; Describe the benefits and drawbacks, excluding costs, of your chosen infrastr
The Internet empowers enhanced communication on global, national, and local levels. With all of the positive aspects, by its very design the Internet is very difficult to co
List the benefits of the solution. Ensure that this solution will eliminate all interoffice toll charges. The design and the implemented solution should not adversely affect
How you would propose protecting your chosen cloud solution from cyber-attack using current password and data protection protocol. Why and how the use of social media
You will design a flowchart and pseudo-code for the application given below. Program will accept user input to store student's first and last name. If name is ZZZ, then the pr