StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Network Topology - Assignment Example

Cite this document
Summary
Network topology Name Name of institution Professor Date “Network Topology” Network topology refers the description of arrangement of systems on a computer network. It defines hoe computers or nodes are arranged and connected to each other within the network (Shoniregun, 2007)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.7% of users find it useful
Network Topology
Read Text Preview

Extract of sample "Network Topology"

Download file to see previous pages

OSPF and EIGRP and RIP routers functions as the interface between the laboratory fund raising and biology laboratory (Shoniregun, 2007). File servers will be storing the files of volunteer’s data, which include network-attached storeroom. The figure indicates an outline of the internetwork routing system. RIP network EIGRP-Network Router-EIGRP Router OSPF Router RIP Router-EIGRP, RIP and performs route redeployment amid the EIGRP and RIP networks. Similarly, router OSPF, RIP redistributes routes amid biology lab and fundraising office (Shoniregun, 2007).

  The tangential router of Fund raising and research lab requires redistribution amid EIGRP and OSPF. 2. What information will you redistribute between routing protocols? When we have a network where multiple routing protocols are present, we   go through a process of route redistribution. The diverse segments of network erudite routes based on the protocol that is configured on them (Shoniregun, 2007). Route redistribution aids in the spread this knowledge in an understandable manner, by other segments.

The roue leaned by EIGRP to RIP should be redistributed in a way that it is explicit by RIP and vice versa. Default-metric or definition of a metric is applied for specific posting. 3. Identify the problems you expect to encounter (with different metrics, security, etc.) when you redistribute. Essentially, efficiency is fundamental in any network. Single metrics pose a challenge in the attainment of optimal performance. Multiple metrics should be integrated into the internet protocol system to ensure, apt internet performance.

On the other hand, the concept of security is primarily connected to the exigency of protecting sensitive data from unauthorized access (Shoniregun, 2007). It is notable that, significant security issues arise during the designation of an internet protocol due to minimal or non-existent of authentication mechanisms In addition, the ad hoc routing protocols used in designing internet protocols systems are susceptible to security issues due to lack of security design features (Shoniregun, 2007).

This renders the protocols vulnerable for attacking. It is noteworthy that, poor security measures during internet designing may lead to an inefficient network, for instances, chances of wrong messaging and redirection to unintended nodes is likely to occur. 4. Explain how you will overcome the problems. This concept of network protocol security is significant for any network to perform. The ever-changing technological trends in commercial applications have complicated the approach of solving protocol security issues (Shoniregun, 2007).

It is imperative to note that quality of service (QoS) in the internet has emerged as a cornerstone for numerous network services (Shoniregun, 2007). The data origin authentication and data veracity for IP, control, and routing protocols remains paramount in ensuring a secure and efficient network. The language used in designing an internet protocol has remained a key challenge in ensuring internet protocol security (Shoniregun, 2007). The security issues can be easily avoided by ensuring high standards of authentication of identity of IP and routing protocols.

More over, the language used should be apt in integrating with the internet protocol specifications and the with the authorization policy. To solve problems arising from metrics, the designer should ensure usage of fixed metrics. This is because, the

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Topology Assignment Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1461875-network-topology
(Network Topology Assignment Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/information-technology/1461875-network-topology.
“Network Topology Assignment Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1461875-network-topology.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Topology

The Concept of Connecting Computers to one Network

Name Institution Course Instruction 13th December 2013 Characteristics of your Network Topology Introduction Network Topology is a systematic arrangement of different nodes of many computers in local area network and wide area network.... Thus, Network Topology means, network that is connected to circular method whereby, each node examines raw data send to a ring finally; it is send through directed address.... topology network is characterized by its capability to be expandable; also, they have an ability to be connected to the central network device, which is reliable for connectivity through a switch, or any other outlet device....
2 Pages (500 words) Essay

Wireless Communication

Mesh topology or mesh network is a Network Topology in which devices are connected with many redundant interconnections between network nodes.... Running Header: WIRLESS Wireless Communication Mesh Topology Mesh topology or mesh network is a Network Topology in which devices are connected with many redundant interconnections between network nodes.... Since for full mesh Network Topology every node must has a circuit connecting it to every other node in a network hence it is a very expensive to implement....
2 Pages (500 words) Essay

E-Business: System Design, Process Design, and Network Topology

The very organization of the hotel into departments and their location are the prime factors for designing the Network Topology and the technologies to be used for efficient communication and sharing of information (Physinfo, 2006).... Then the next step is to organize the very notion of fetching the gross elements of getting the ultimate job done....
2 Pages (500 words) Essay

Spam Detection and Categorisation and Network Protection using a Firewall

These marketing emails are normally known as junk mails which automatically move to junk email folder.... The spam reorganization report which was produced by… This is not a big threat but it does impact the organizations' image.... Organizations prevent themselves from such threats by the mean of implementing various techniques and costly solutions in order to filter Solutions are implemented by keeping in mind the cost and time constraints for the processing of emails to be filtered....
3 Pages (750 words) Lab Report

Network Topology Design

Additionally, the company projects a… This requires a Network Topology that is stable, secure, and integral. For the first ten employees of the company, a ring topology proves to be very effective; this topology holds all the employees equal thereby allowing them equal Network Topology Design The company has grown from ten to a hundred employees in one year.... This requires a Network Topology that is stable, secure, and integral.... or the first ten employees of the company, a ring topology proves to be very effective; this topology holds all the employees equal thereby allowing them equal access to the databases....
1 Pages (250 words) Assignment

Network Topology Design

Network Topology is defined as the arrangement of a variety of computer elements which may include linking computers using links and nodes (n-nodes) among other elements (they way network is configured physically or logically).... This is usually done to ensure sharing of resources… In this paper, am going to depict various Network Topology models.... Network Topology models Network Topology models Network Topology is defined as the arrangement of a variety of computer elements which may include linking computers using links and nodes (n-nodes) among other elements (they way network is configured physically or logically)....
2 Pages (500 words) Research Paper

Network Topology Design

In the current speedy and constantly advancing technological world, designing of a high quality Network Topology is always a very crucial subject of concern (Karris, 2009).... In essence, a quality Network Topology design results into in a computer network configuration that… On this regard, this paper lays major emphasis on designing quality network topologies via an account of an account of a company that has been experiencing aggressive expansion every year. It is vital to note Network Topology Design Executive Summary In the current speedy and constantly advancing technological world, designing of a high quality Network Topology is always a very crucial subject of concern (Karris, 2009)....
1 Pages (250 words) Assignment

Network Topology and Design Layout

For a start-up open source software company as the company ABC, it would be a great challenge to fully implement an effectively secured network.... Below is a graphical representation of the network design layout.... Furthermore, the companys network designer must keep security assumptions in mind and see to it that the security is an integral part of the original design....
4 Pages (1000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us