Physical Network Design: Network Phenomenon

Improved Essays
I. Physical Network Design

A. Network Topology
Business Needs
Topology is important as it is the way the computers in this business will be lined up and how they pass information from one to the next. A wrong topology can cause a lot of extra expensive and headaches for the IT personal. The correct topology will make it easier to manage and will help keep the system running smoothly.
A physical topology must be picked that can be easy to set up and easy to maintain. It should allow systems to keep running despite one system on the network failing. It should be connected centrally through one device, for extra security measures. The logical topology should allow computers to communicate, but should flood all the systems at once with unnecessary
…show more content…
Process of elimination lets me know that the mesh, bus, etc. could be use, but do not fit the needs of the company. Mesh could be used for the wireless access point that will be put in the student lobby but may not be logical for the entire network. Mesh could be a separate topology from the rest, but for simplistic purposed it was not picked. The bus physical topology does not allow for computers to stay up if there is a failure of a system, which each system depends on the one previous to it. To make matters simple a star fits the needs of the company and is easy to manage and trouble shoot. Also, the star topology has one central point, which is good for security …show more content…
A network device should allow for wireless connection for the student lobby. Network devices should be able to be secured and maintained with ease. The network devices should fit the needs of 524 potential hosts.
Proposed Network Devices
Switches in the closets and server rooms should be used over hubs. One 48 port switch is used for each classroom closet and server room. The computer lab uses a 72 port switch because of the number of hosts connected to it. Patch panels are also used for each closet and server room. More specifically, (2) 24 patch panels per classroom closet, (1) 24 patch panel for server rooms, and (3) patch panels are used for the computer lab. One wireless access point is used for the student lobby. Modem provided by the LES is used with an Ethernet port, if not then a media converter for coaxial cable to Ethernet will be used.

Related Documents

  • Decent Essays

    - LAN networking is used in Clustered system, in Multiprocessor system LAN etc. is not required. - The aim is high availability in clustered system whereas in multiprocessing it is time saving. - The processors share same system clock and common data structures. 7.…

    • 681 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    CS320 Assignment 1 Andrew McConnon 13349871 You want to connect different computers, at different locations, so that they can exchange data with each other. What are the different challenges that you need to overcome? Host Identification on small networks isn’t a problem as it can be set up with manual ways of addressing, but will be exponentially harder the larger a network becomes. Protocols, DHCP servers and addressing are a huge need if you want to create and sustain a large, expanding network.…

    • 399 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    The essential requirements of the organization is voice correspondence on which the whole business depends. In this way, the administration needs to pick the alternative which can improve the execution of the voice correspondence alongside the system versatility, cost adequacy and adaptability. As indicated by the given situation, the organization is offering for two alternatives, an exchanged Ethernet 100-Base – T network or Wi-Fi network. Both of these choices have their advantages and disadvantages and should be picked by the necessity. The organization can likewise concentrate on introducing voice only lines which may have better reliability and high performance for voice transfer.…

    • 234 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Due to the fact that all of your communication systems will be unified under this secure network, you will be able to enjoy maintenance and operations savings on a monthly basis. BroadConnect’s phone systems provide portable connectivity through a private…

    • 480 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    AMT2 Service Line Development Task 4 Echo Breen A. Determine the feasibility of one of the proposed service lines in the attached “Service Line Development Case Study” by doing the following: A1. Evaluate the demand for the new service line in the market area defined in the case study. Trinity Community Hospital (TCH) has the opportunity to develop a new orthopedic service line. It is anticipated that there will be a huge increase in need for orthopedic services within the next 5 years; orthopedic cases will increase by 46%, joint and spine procedures will increase by 30% and outpatient joint and spine procedures will increase by 350%.…

    • 1461 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Here are some basic requirement to have a company network that can be fast and reliable I would like to have some time to talk to your IT manager to know where we are, and know the needs. Your IT manager might have most of this suggestion deployed already, in that case this can be used as a check list I will try to help as much as possible and I will be open to do any configuration of any device when you need me to ( I can do that from here) 1. The size of the company needs to be taken in consideration as well as the potential grown ( for space requirements)…

    • 485 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    Use of multiple routers in interconnected networks: Exchanging information about destination addresses using a dynamic routing protocol. A router has different physical ways to operate network connections, such as: • Fibre optic • Copper cables • Wireless A router also contains several firmware for different networks’ protocol standards.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Here, an evaluation including 40 graphs from the Internet Topology Zoo is carried out. For each graph,…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    At last, there are different workplaces in the building. Each of these workplaces will have one PC for staff use, except for the confirmations office, which will have five PCs. There will be two server rooms, one on the first floor and one on the second floor. The main requirements for designing the network are: • Student-got to PCs ought to be on separate network from the staff systems. PCs for open utilization ought to be on a different system.…

    • 877 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Ethernet Technology The Ethernet technology was mostly used in the LAN because; 1. We used Ethernet speed of 10mbps for areas in the LAN that required higher bandwidth 2. Our campus network model supports dual links between each distribution layer routers and case switches. We are there able to load balance the aggregate traffic from multiple access switches across the links.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Great Essays

    Data-centric and process-centric integration are both parts of the integrated structure that Carrier has defined. He defined in 1999 that data-centric is the automation and integration of data, and those data can be exchanged between the information system. Process-centric, on the other hand, is more of involving data and applications together at all levels. Linthicum, Morgenthal and La Forge believes that process-centric integration is the highest level of integration for the business. They are two different integration and organizations can choose what kind of integration structure to use based on what the goal of the organization is since there are pros and cons to both of the integration.…

    • 1110 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    TITEFLEX CASE STUDY Strategy Analysis from the Case Study Customer-driven The customer is the final arbiter of product and service quality and customer loyalty, retention and market share gain are best optimised through a clear focus on the needs of current and potential customers. Significant Benefits: • Market share gain • A clear understanding of how to deliver value to the customer • Minimised transaction costs • Long term success. (study guide pg 22) From the case we learned that Simpson felt sandwiched between very angry customers and needed a good strategy to deal with irate customers, and two of Titeflex customers had told Simpson they were considering dropping Titeflex as a supplier.…

    • 1088 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4. Missing Elements In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet.…

    • 923 Words
    • 4 Pages
    Improved Essays