Physical Network Design: Network Phenomenon

Decent Essays
I. Physical Network Design

A. Network Topology
Business Needs
Topology is important as it is the way the computers in this business will be lined up and how they pass information from one to the next. A wrong topology can cause a lot of extra expensive and headaches for the IT personal. The correct topology will make it easier to manage and will help keep the system running smoothly.
A physical topology must be picked that can be easy to set up and easy to maintain. It should allow systems to keep running despite one system on the network failing. It should be connected centrally through one device, for extra security measures. The logical topology should allow computers to communicate, but should flood all the systems at once with unnecessary
…show more content…
Process of elimination lets me know that the mesh, bus, etc. could be use, but do not fit the needs of the company. Mesh could be used for the wireless access point that will be put in the student lobby but may not be logical for the entire network. Mesh could be a separate topology from the rest, but for simplistic purposed it was not picked. The bus physical topology does not allow for computers to stay up if there is a failure of a system, which each system depends on the one previous to it. To make matters simple a star fits the needs of the company and is easy to manage and trouble shoot. Also, the star topology has one central point, which is good for security …show more content…
A network device should allow for wireless connection for the student lobby. Network devices should be able to be secured and maintained with ease. The network devices should fit the needs of 524 potential hosts.
Proposed Network Devices
Switches in the closets and server rooms should be used over hubs. One 48 port switch is used for each classroom closet and server room. The computer lab uses a 72 port switch because of the number of hosts connected to it. Patch panels are also used for each closet and server room. More specifically, (2) 24 patch panels per classroom closet, (1) 24 patch panel for server rooms, and (3) patch panels are used for the computer lab. One wireless access point is used for the student lobby. Modem provided by the LES is used with an Ethernet port, if not then a media converter for coaxial cable to Ethernet will be used.

Related Documents

  • Decent Essays

    The DHCP server will then respond with an IP address that your computer will utilize for that session. 6. (5 points) What benefits and problems does dynamic addressing provide? The most important benefit of using a dynamic IP address is that it will be much harder for someone to gain access. However, a major problem would be the IP address changing frequently, as this would be…

    • 766 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Nt1210 Unit 3 Assignment

    • 1204 Words
    • 5 Pages

    So if one workstation goes down then none of the other workstations will be affected. But if the central computer (the server) goes down or the hub or switch goes down then the entire network will fail. Still when the central computer goes down it will not affect the data of the other computers, so when the central computer is repaired again the network will start to work again. The main difference between the Star topology and the other two topology is that here when a workstation goes down, other than the server, the network will still be working, where in the other topologies there is no main server so when a workstation goes down it will also take down the whole network with it. This is the main important advantage for which we selected the Star topology.…

    • 1204 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Mike Lynn: Whistleblower

    • 1252 Words
    • 6 Pages

    Cisco Systems were trying to safeguard the interests of their clients but they were not able to find the right way to assess a solution in their system which will provide better security of the data of their clients. Cisco and ISS also needed to be a little more cooperative in solving the problem rather than throwing a blanket over it so that their business is not affected. Cisco and ISS could’ve assured Mike Lynn that this problem was going to be looked upon but instead they gave him a different topic to talk about which resulted in resignation of Mike Lynn. The internet routers were also at constant risk of getting hacked into since they weren’t completely protected by Cisco. Cyber security is a very sensitive matter as internet is supposed to be a place where your data could stay private but lately it hasn’t been the case.…

    • 1252 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    This also makes the solution very easy to scale as a company grows. Easy to change. Customizations, workflows and preferences in SaaS CRM solutions are performed through configuration, not coding. Changes are easy as well because the application just needs to be reconfigured whenever business needs or processes change. Despite these attractive benefits, SaaS CRM implementations will deliver limited value if the associated integration issues are not considered and resolved upfront.…

    • 2664 Words
    • 11 Pages
    Decent Essays
  • Decent Essays

    Therefore it is beneficial for us to use this device to help with some our everyday life including social activity as well with work related interviewing and tasks that are also pointed out. Still there is the fact that it can help with information purposes that are needed since to get to the internet we must have access point a to get from one area to another to interact with the internet from a distant location. Although that is why the router is here to help us to do that as which it was invented to solve the problem we had 35 years ago. Instead of just doing this it can also have way to secure your network information profile by having an installed firewall protection for critical threat prevention ("Network Routers - Mobile Routers - Cisco Routers." Cisco.…

    • 1350 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    The big problem many people have with it is the lack of privacy. “Should we believe that under Net Neutrality the government will trust the telecoms to police themselves?” (Josh Steimle, Forbes) Because the internet is open so people can’t control the people that view their information. This makes it so hackers and ordinary people can access private information. Yes that is a problem with net neutrality but there are ways to prevent it. Many websites provide ways to keep your information private and so only the people you want can see it.…

    • 1138 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Networks rely on these two types of transmission for everyday networking. A personal area network is to "communicate between two or more devices. PAN networks can be used between devices owned by two different parties, or between two devices owned by one person" (Eric Cole). An example of this would be a keyboard paired to a computer. The most common form of a personal area network is Bluetooth Bluetooth is a technology that has greatly increased are mobility when using devices that are in a close vicinity of each other.…

    • 791 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    1. Read the paper; http://www.garykessler.net/library/tcpip.html. Based on this paper (supplement as needed with other material from the Internet), please answer the following. Solution:  Define ARP – one sentence summary is sufficient ARP is an acronym for Address Resolution Protocol which is a network layer protocol used to convert or map IP address into physical address like MAC address.  Explain the difference between network and machine addresses A network address is a unique address which is used as identifier for a node/computer on a network which is internet or intranet.…

    • 1622 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    Password Security Threats

    • 2482 Words
    • 10 Pages

    Users need to understand that anytime a public network is accessed, their information is at risk. Often times a library may seem like it would offer a more secure network, but this is not the case. Users must constantly be aware that any businesses that offer free Wi-Fi are not providing a secure network. While these areas may be safe places to check social media, it is not a safe place to access any websites that contain personal data. There are a few simple tricks out there to keep information a bit more secure, make sure to turn off sharing and always connect as public, not private.…

    • 2482 Words
    • 10 Pages
    Decent Essays
  • Decent Essays

    “Two-thirds of computer jobs are in non-technology industries, such as healthcare, banking, or manufacturing” (Education Week, vol. 35, no. 34). To have coding experience and an understanding of computer science is valuable, because one can then start “learning technology and analytical skills” to apply onto “a wide range of practical business applications.” (Education Week, vol. 35, no.…

    • 883 Words
    • 4 Pages
    Decent Essays