Create a basic diagram that depicts a star network topology

Assignment Help Computer Networking
Reference no: EM131041870

You were selected to design a small peer-to-peer network for a new facility which has six computers and a networked printer. Each desk computer must have a wired network connection as well as wireless access for mobile devices. Using the Gliffy (Links to an external site.) software, create a basic diagram that depicts a star network topology with a switch as the central communications node. The focus here is on the network communications equipment for this LAN so include only that equipment and end nodes on the network. There is no need to draw out the physical space.

Once you are complete with the diagram write out a 3-4 paragraph description of your design. Explain how the hardware is connected, what cable media is used, etc. State any assumptions you've made about the kind of work being done, the demands the people in the office will put on the network or how they'll use it, and how that influenced your design. For example, if this is a small streaming video-based news service, they probably need more performance from the network and their ISP than a small rental property management office might.

Requirements:

Depict a star topology in the diagram

Position the central hardware network communications device that enables end nodes to connect to the network (switch)

Include hardware devices that:

connect your network to other networks (router)

connect your LAN to the ISP (modem)

connect devices to the LAN via wireless (wireless router)

for this activity use a separate hardware unit for each element; do not use combination devices such as a modem/router or router/switch

Specify internet connection via service provider (cable, fiber, dial-up?)

Include six (6) end nodes (desktop computers) and the networked printer

Note the type of cable media used between the switch and end nodes (be specific)

Label all items (brand and model names are acceptable but not required)

Save your diagram as an image (.jpg or .jpeg) and insert this image into your Word document with the written description

Optional:

Detail a security solution. Is this a hardware firewall, software, or both?

Diagramming software:

Gliffy: https://www.gliffy.com/ (Links to an external site.)

Use network images: to access, select More Shapes (bottom left menu) > Network > Business

Gliffy User Manual.

Reference no: EM131041870

Questions Cloud

Bank evaluation process : Assume that you are nearing graduation and have applied for a job with a local bank. The bank's evaluation process requires you to take an examination that covers several financial analysis techniques. Use the following information for Questions 1..
Optimal order quantity and associated annual total cost : Suppose that your company supplies toothpaste to Wal-Mart, and they are your only customer. Wal-Mart orders its EOQ of 1,000 tubes each time they order. The annual demand for these tubes is 40,000 units. Your setup cost is $100 per order, and your an..
Developing product-about new products relative advantage : When developing products, what does the term relative advantage mean? Explain why management teams should be concerned about a new product’s relative advantage.
Create a portfolio with an expected return : Your choices are Stock X with an expected return of 11 percent and Stock Y with an expected return of 8.0 percent. If your goal is to create a portfolio with an expected return of 9.59 percent, how much money will you invest in Stock X and Stock Y..
Create a basic diagram that depicts a star network topology : Create a basic diagram that depicts a star network topology with a switch as the central communications node. The focus here is on the network communications equipment for this LAN so include only that equipment and end nodes on the network.
Contrast assembly customization with design customization : Compare and contrast assembly customization with design customization. Why are efforts to maintain barriers to existing or new competitors using assembly customization of limited effectiveness?
Draw a design of a cloud based system for storing : SIT113 - Cloud Computing and Virtualisation Trimester Assignment. Draw a design of a cloud based system for storing, accessing, updating, processing, securing, sharing, and publishing S-mart data and information
How is corporate eventuring used as an aid : How is corporate eventuring used as an aid to search for innovation opportunities? Explain the relationship of the organization’s strategic plan and vision statement to the corporate venturing methodology.
Evaluate nike roshe function nm laser : Currently most of us obtain a better evaluate that Nike Roshe Function NM Laser. Supplied throughout not one but two incredible shades involving black/white plus all-white.

Reviews

Write a Review

 

Computer Networking Questions & Answers

  Using microsofts threat analysis amp modelling tool create

using microsofts threat analysis amp modelling tool create a threat model for your own blog setup. additionally explain

  Explain client-server architecture

When people describe client-server architecture, they are usually referring to a system in which a large server is serving a client on a PC. With X Window, the reverse is frequently the case. Explain

  Lan security in a network environment

Discuss today's Local Area Networks security issues related to peer-to-peer network, client /server network and virtualisation environment.

  Which of following is not class of client-server processing

Retail point of sale systems are an example of horizontal partitioning of data processing.

  Configure a dns server with both forward and reverse lookup

Configure a DNS server with both forward and reverse lookup. You should configure a domain name zone of your_surname .itc514.edu, and a reverse name mapping zone of 192.168.15.0/24.

  Analysis of the existing wan for acme medical center

Write a 2-page paper based on your analysis of the existing WAN for Acme Medical Center that describes: The weaknesses in the WAN

  Diane the consultant summary of case

Case study:Diane the consultant Summary of case : Construct a diagram using Rationale to map the arguments about a moral claim that you have identified in the article/case study:

  End to end encryption

How is end to end encryption different from other types of encryption? At what layer does it take place?

  Define the s-t cut on node capacitated network

How would one define the s-t cut on node capacitated network as opposed to the edge capacitated network, and how would one illustrate that analogue.

  Is the given an simd or an mimd system

The workers then fly off in different directions looking for marigolds. Is this an SIMD or an MIMD system? The NVIDIA Fermi GPU is similar in spirit to one of the architectures we studied Which one?

  Has this network been sub-netted

Assume a host computer has the following configuration: IP Address: 145.20.110.176 Subnet Mask: 255.255.0.0 Default Gateway: 145.20.1.1 a. What is the Class of this network?

  Current ethical and legal concerns

Evaluate the current ethical and legal concerns surrounding your topic. Compose an executive summary highlighting the paper's contents and reasoning for your chosen topic

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd