Network Topology Essay

1468 Words3 Pages

2.0 NETWORK TOPOLOGY

2.1 NETWORK WITHIN A BULDING

A new three level building will be built to accommodate three computer labs for Faculty of Computer Science and Information Technology. It will be a separate building from the existing one. Each level will accommodate one lab. 50 personal computers (PCs) and a shared printer will be located in each lab. All three labs will be linked to each other and also to a server room located at the second level of building. Additionally, each lab will be equipped with wireless access points. Figure 2.11 A hybrid topology: a star backbone with two bus networks in a single computer lab Figure 2.11 above shows the network topology in a single lab. In the lab, a star topology is used to connect a printer, …show more content…

It can be used to support public Internet hotspots whereby can be connected by mobile devices such as smartphone, laptop and tablet. Most of the wireless routers claim to support up to 255 connected devices. It is theoretically possible by connecting 225 mobile devices to a single Wi-Fi access point in the same time, but it is not recommended. By connecting such a huge amount of devices into the same hotspot, the performance within the network will be very poor. Instead, install multiple access points to distribute the network load and to cover the “dead spots” in the lab. Hence, any number of devices can be supported effectively. That is why each lab is equipped with a wireless access point instead of installing only single access point in the entire building as shown in the Figure …show more content…

There are some requirements to connect the network in the new building to the Internet. First, Internet Service Provider (ISP) is needed as it provides Internet services. It allows user to access the Internet from a PC in the lab. Also, ISP is the link between the computers and all other servers or services which available on the Internet. For example, electronic mail or email, web hosting and access to software tools. Second, equipped with a modulator-demodulator or in short form, modem, is part of Internet services which use more advance techniques to achieve higher network speed. User can log on to the Internet and browse the World Wide Web for sending or receiving email purposes. However, user might expose to various types of computer security risks. For example, hacker, virus, information theft, unauthorized access and use. Hence, firewall is needed. Firewall is a software that runs on computer, which inspects network traffic passing through it, and denies or permits passage based on a protocol or a set of rules. Firewall is designed to block unauthorized internet user from accessing private networks connected to the

More about Network Topology Essay

Open Document