+1-415-670-9189
info@expertsmind.com
Find the network diameter
Course:- Computer Networking
Reference No.:- EM13830142




Assignment Help
Assignment Help >> Computer Networking

Question:

You have a total of six switches, with each switch containing eight ports. One port on each switch can be configured for straight-through or crossover operation.

Show one way to connect all six switches and indicate the number of computers that can be connected

Develop a different way to connect the switches and count the number of computers again. Does one topology give better results than the other?

For both solutions, assuming that 100 meter UTP cables are used between each switch and from switch to computer, find the network diameter.

Answered:-

Verified Expert


Preview Container content

Introduction:

The limitation of the topology shown in figure 1 can be overcome by rearranging the connections of the switches. The improved topology is represented in figure 2. In this topology the switches are not connected to each other. One switch is the master switch and others are connected to the switch.

The switch s1 is connected to 3computers and other ports of s1 are used to connect other switches. The switchess2 to s6 use one port to connect to master switch and seven ports to connect to computers.

The total number of computers connected is 38. This topology is better than the topology shown in figure 1. This topology is more reliable and fault tolerant than the previous one. The performance is better here.




Put your comment
 
Minimize


Ask Question & Get Answers from Experts
Browse some more (Computer Networking) Materials
Required to set up a small network with network ID: 210.15.5.96/27. In this network, there are three routers, two servers, one acting as DHCP Server and another as Mail/DNS
What are the SSIDs of the two access points that are issuing most of the beacon frames in this trace - What are the intervals of time between the transmissions of the beacon f
Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate ris
Suppose you started working as a network manager at a medium-sized firm with an Internet presence, and discovered that the previous network manager had done a terrible job o
You are to write a program that will read a file of scrambled 7-letter strings, and then prints out the highest valued legal Scrabble word(s). Before reading the file, your
Suppose a subnet with prefix 128.119.40.128/26. Provide an example of one IP address (of the form xxx.xxx.xxx.xxx) which can be allocated to this network.
You will design a flowchart and pseudo-code for the application given below. Program will accept user input to store student's first and last name. If name is ZZZ, then the pr
Your network solution should address the need to integrate the nursing school network into your newly designed campus network. The nursing school network needs to be redesig