+1-415-670-9189
info@expertsmind.com
Find the network diameter
Course:- Computer Networking
Reference No.:- EM13830142




Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Computer Networking

Question:

You have a total of six switches, with each switch containing eight ports. One port on each switch can be configured for straight-through or crossover operation.

Show one way to connect all six switches and indicate the number of computers that can be connected

Develop a different way to connect the switches and count the number of computers again. Does one topology give better results than the other?

For both solutions, assuming that 100 meter UTP cables are used between each switch and from switch to computer, find the network diameter.

Answered:-

Verified Expert


Preview Container content

Introduction:

The limitation of the topology shown in figure 1 can be overcome by rearranging the connections of the switches. The improved topology is represented in figure 2. In this topology the switches are not connected to each other. One switch is the master switch and others are connected to the switch.

The switch s1 is connected to 3computers and other ports of s1 are used to connect other switches. The switchess2 to s6 use one port to connect to master switch and seven ports to connect to computers.

The total number of computers connected is 38. This topology is better than the topology shown in figure 1. This topology is more reliable and fault tolerant than the previous one. The performance is better here.




Put your comment
 
Minimize


Ask Question & Get Answers from Experts
Browse some more (Computer Networking) Materials
Router Traffic Classification Proof of Concept, Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab and what you
What is the transmission rate of information bits if you use ASCII (8 bits plus 1 parity bit), a 1,000-character frame, 56 Kbps modem transmission speed, 20 control charact
You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO has asked you to explain why you recommend it is so important to secure your
Create a communication system (block diagram) which will permit transmission of these four sources over telephone using frequency division multiplexing and TDM PCM assume usi
Identify possible network infrastructure vulnerabilities. Address network vulnerabilities with the appropriate security measures. Ensure that consideration is given to virtu
Discuss the impact of flash and ‘the cloud' on enterprise storage environments as a whole. You should discuss the success factors contrasted with the pitfalls that companies
Where are WLAN technologies going in the future? Research what the next versions of the 802.11 standards are, and provide your educated opinion on how these technologies wil
You are required to set up a network consisting of a PC, router and server. The router will have two ethernet network interfaces and be configured to route network traffic b