+1-415-670-9189
info@expertsmind.com
Find the network diameter
Course:- Computer Networking
Reference No.:- EM13830142




Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Computer Networking

Question:

You have a total of six switches, with each switch containing eight ports. One port on each switch can be configured for straight-through or crossover operation.

Show one way to connect all six switches and indicate the number of computers that can be connected

Develop a different way to connect the switches and count the number of computers again. Does one topology give better results than the other?

For both solutions, assuming that 100 meter UTP cables are used between each switch and from switch to computer, find the network diameter.

Answered:-

Verified Expert


Preview Container content

Introduction:

The limitation of the topology shown in figure 1 can be overcome by rearranging the connections of the switches. The improved topology is represented in figure 2. In this topology the switches are not connected to each other. One switch is the master switch and others are connected to the switch.

The switch s1 is connected to 3computers and other ports of s1 are used to connect other switches. The switchess2 to s6 use one port to connect to master switch and seven ports to connect to computers.

The total number of computers connected is 38. This topology is better than the topology shown in figure 1. This topology is more reliable and fault tolerant than the previous one. The performance is better here.




Put your comment
 
Minimize


Ask Question & Get Answers from Experts
Browse some more (Computer Networking) Materials
Have you or your employer been impacted by the migration to IPv6? Have the time and cost estimates made by NIST been born out; are they more costly or less costly, or the same
Assignment No. 1: Computer Network Security for a Home/Small scale Network.Learning outcomes:1. Identify the various threats and risks in a small scale network2. Describe and
Compare and contrast collecting evidence at a private-sector incident scene and processing a law enforcement crime scene. Compare the differences and similarities of evidenc
Using the IP ranges below: 245.0.0.0/8 225.113.9.0/25 169.254.137.0/25 192.168.0.0/16 172.16.0.0/24 10.0.0.0/8 245.125.1378.0/24 215.154.10.0/24 225.113.8.0/24 127.0.0.0/8 10.
Does rule list any particular oddities or protocol(s) or anything which makes it unique (such as messages)? If so, list these. If not, what must be included?
ITNW 1358- Which WAN solution offers continuous and consistent bandwidth at all times of day and nights? Which WAN solution is similar to and has largely replaced frame relay?
Average telephone is used to make four calls per 8-hour workday, with mean call duration of six minutes. Ten percent of calls are long distance. Determine maximum number of
How would the routers help in monitoring passing traffic over the networks and Internet under safe and secure conditions? Provide examples of how it would be done and why it