Answer to Question #269401 in Computer Networks for Shanu

Question #269401

Department Number of Users


Customer Care 10


Sales and Marketing 20


Finance 25


Legal 5


HR 10


Developers 55


Network Team 5


Server Room


Servers +ISP connections


· High level of redundancy is expected in network design to eliminate single point of failures and traffic bottle necks.


· Sales and Marketing Team need to access Network resources using WIFI connectivity.


· Proper methods for networking monitoring and troubleshooting need to be established.


· All possible network security mechanisms should be implemented.


Recommend suitable network topologies and network protocol suites for above scenario and justify your answer with valid points.



1
Expert's answer
2021-11-21T04:51:13-0500

Customer Care 10


Sales and Marketing 20


Finance 25


Legal 5


HR 10


Developers 55


Network Team 5


Server Room


Servers +ISP connections


· High level of redundancy is expected in network design to eliminate single point of failures and traffic bottle necks.


· Sales and Marketing Team need to access Network resources using WIFI connectivity.


· Proper methods for networking monitoring and troubleshooting need to be established.


· All possible network security mechanisms should be implemented.


Recommend suitable network topologies and network protocol suites for above scenario and justify your answer with valid points.

Answer:

Mesh Topology

In this type of topology, a host is connected to one or multiple hosts.  This topology setup allows for most transmissions to be distributed even if one of the connections goes down

Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to-point links. Mesh technology comes into two types:

  • Full Mesh: All hosts have a point-to-point connection to every other host in the network. . It provides the most reliable network structure among all network topologies.
  • Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts connect to each other in some arbitrarily fashion. This topology exists where we need to provide reliability to some hosts out of all.


Hybrid Topology

A network structure whose design contains more than one topology is said to be hybrid topology. Hybrid topology inherits merits and demerits of all the incorporating topologies. It is extremely flexible. It is very reliable. It is easily scalable as Hybrid networks are built in a fashion which enables for easy integration of new hardware components.


Suitable network protocols for the above scenario.

Def.: A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network.

1..TCP/IP stack is designed to be generic as possible, so applications can interact with various data link protocols such as 802.3 (Ethernet), 802.11 (Wi-Fi), PPP (point-to-point protocol) and so on without needing to know what sort of link they are using.

 

2.WPA3 protocol-when choosing from among WEP, WPA, WPA2 and WPA3 wireless security protocols, experts agree WPA3 is best for Wi-Fi security. As the most up-to-date wireless encryption protocol, WPA3 is the most secure choice. Some wireless APs do not support WPA3, however.

 


3. Simple Network Management Protocol (SNMP) is used to monitor the network

 

·        Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior.

·        SNMP is widely used in network management for network monitoring.




Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Comments

No comments. Be the first!

Leave a comment

LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS