Extended Star Topology
What type of topology should be used in this network? Why?
An extended star topology will be a suitable topology to be used because it has no data collision this enhances high performance of the network according to. Using extended star topology is more advantageous since incase there is a network failure in one device other devices within the network are not affected (Pfaff et al., 2009). The affected device can easily be repaired by unplugging the connected cable from the switch of repeater and replacing it. Additionally more network end devices can be supported with this type of network topology. Bus topology will also implemented in the network through linking network from the router to the rooms. The cabling connects with the devices from rooms directly with the main cable forming a bus topology
Server –based network type will be used in the design and implementation of the network at Ebiz.com this is because applications like billing information are supposed to run from the server .Server will be used as a central repository for information and various running programs for the network. It will be located at central place within the organization buildings in a equipped room that is well ventilated to be easily accessed (DeSantis et al., 2008). The functions of the server will include storing, retrieving and sending files to computers within the network. The website database of the company will also be stored at the server so that it can easily be accessed by users since the server will be running throughout. Several fiber cables will run from the server to substations to supply network this will form a star topology. Since servers have more processing power than normal computers the network will be faster and employees will easily access data from it. Stable power will also be provided to them since they run for a long period of time. Also peer to peer network type will be implemented since there are some of the application run from the client side. This type of network will be used where employees will be need to share data within an office (Ballette et al.,2012). This application that run from the client side include word processing and spreadsheet. The server will be located in one room but different computers will be given access to different servers depending on their functionalities. The network admin will have full privileges to access all the servers and make changes on them.
Bus Topology
Ebiz.com Company requires 250 workstations to be used .Therefore there will be two hundred and fifty computers that will be configured in the network. Each computer will be connected to a network switch through Ethernet cable to form star topology. This kind of topology is more advantageous since incase one device fails it does not affect other devices and it can easily be removed and replaced with another device without interfering with the other devices .The network will support 250 users with the management given the first priority. Other devices like phones and personal computers will connect to the network through Wi-Fi (Homa & Harris, 2014). The network will be out of reach from somebody trying to access it outside the company’s compound.
Since the network to be implemented at Ebiz.com is wide network and it requires many workstations to be implemented. There are various devices that will make the functioning of the system more efficient and fast.
Switches are the easiest network devices to be configured this because they only get access to information that is being transmitted or passing through them. An extended network star topology will be the best because there will be a central switch that connects to other small switches which then connects to the work stations. Ethernet cables will be suitable for connecting the network devices since they are cheap and easy to be terminated and used. More so Ethernet cables are faster for data transmission between the devices and they last longer than other mediums of transmission. Without forgetting the shielded cables which are the best for outdoor connection (Fyles. Key & Sethi, 2013). Servers will also be used in the network for data storage .Since other devices within the network should be highly protected from damages i.e. the server, the network will have an equipped room with the following functions. It will store, routers, server, un –interruptible power supply (Ups) and other devices that are related to electricity. Ups will be used in controlling shut down of devices in case there is power loss to avoid damages. Devices that provide security to the network will also be implemented in the network e.g. network firewalls. Firewalls will be implemented in the network to prevent unauthorized users from accessing the network. They also give limited access to some users. Employees will have limited access in the system than the managers. Network devices like routers will be given IP addresses to be uniquely identified within the network .Special commands will be used for this configuration. Other devices like cabinets will be used in mounting network switches. This enhances their security and keeps them away from damages that may be caused by employees
- Please draw a network diagram to represent the EBiz.com network.
Server-based Network Type
Servers are located in the ground flow .They are all connected to together through a switch which is then connected to the router that connects and links the network to each room. Each room floor is connected to the router to form a bus topology as shown in the figure above. Rooms are connected through switches to the router. Network in the rooms can be cascaded by connecting the existing switch to another switch in order to increase the number of ports in rooms for more connection (Kincaid et al.,2015) This also create room to expand network in case the company will requires expansion of the network to new buildings. Switches in the rooms will be well mounted in cabinets and connected to UPS to prevent power from damaging the switches. Closed cabinets will enhance security of the switches and prevent them from being damaged. Switches will also be connected to patch panels to increase the number of ports for LAN connection in the network (Kreskas and Serry, 2010).
Sub netting-This is the practice in which a network is divided two or more networks .it can also be defined as a logical division of an IP network. Computers that belong to the same subnet are addressed with the same bit group (Westfall & Corp, 2009).
Three subnets will be needed in the network to enhance communication among devices within the network.
Ip address |
192 |
168 |
10 |
0 |
IP binary |
11000000 |
1010100 |
00001010 |
0000000 |
Subnet binary |
11111111 |
11111111 |
11111111 |
11000000 |
Subnet mask |
255 |
255 |
255 |
192 |
The subnet mask will be 255.255.255.192
We will use a Class C address which takes 5 bits from the Host field for sub netting and 3 bits for defining hosts as shown in figure 1 below. Having 5 bits available for defining subnets means that we can have up to.
2^ 5 which equals to 32 subnets
The subnet used include.
NETWORK NUMBER |
HOST RANGE |
192.168.10.0 |
192.168.10.1-192.168.10.62 |
192.168.10.1 |
192.168.10.1-192.168.10. |
The subnet mask of the network will be 255.255.255.240
- List the first 4 subnet addresses the mask will create.
Subnets will include.
197.14.88.20
197.14.88.36
197.14.88.22
197.14.88.14
Reference
Ballette, M., Gasparroni, M. and Brick, P., Vodafone Group PLC, 2012. Peer to peer network. U.S. Patent 8,214,489.
DeSantis, R.P. and Santos, J.M., AlphaBlox Corp, 2008. Sever-based method and apparatus for enabling client systems on a network to present results of software execution in any of multiple selectable render modes. U.S. Patent 6,665,860.
Fyles, A., Key, A. and Sethi, V., International Business Machines Corp, 2013. System and method for efficient computer workstation screen updates. U.S. Patent 5,491,780.
Homa, J. and Harris, S., 2014. Intelligent network requirements for personal communications services. IEEE Communications Magazine, 30(2), pp.70-76.
Kincaid, R., Moh, D. and Kuchinsky, A., Agilent Technologies Inc, 2015. Systems and methods for providing visualization and network diagrams. U.S. Patent 7,224,362.
Kruskal, J.B. and Seery, J.B., 2010, July. Designing network diagrams. In Proc. First General Conf. on Social Graphics (pp. 22-50).
Pfaff, B., Pettit, J., Amidon, K., Casado, M., Koponen, T. and Shenker, S., 2009, October. Extending Networking into the Virtualization Layer. In Hotnets.
Westfall, R., CRAY CANADA CORP, 2009. Network topology having nodes interconnected by extended diagonal links. U.S. Patent 7,620,736.