Unit 3. Assignment 1. Network Topology Paper Hierarchical layout defines how the network topology is structured physically and logically. In physical topology all devices and components are placed in various locations depending on the layout. Logical topology is the flow of data throughout the layout. There are many variations of network topologies that can be implemented. The most common network topologies are star, bus, and ring. Star topology is setup with each host connected to a central
Words: 396 - Pages: 2
Marketing Plan CROP - Salon | Unit 3 – Assignment 4 | Kiranpreet Multani BMC151602551 | In this assignment, I am going to develop a coherent marketing plan for a product or service. The service I have chosen for this assignment is a salon. First, I will explain marketing mix and then I am going to develop a marketing plan for this service. Marketing mix The marketing mix refers to the set of actions, or tactics, that a business uses to promote its product or service in the market. The
Words: 4250 - Pages: 17
Network Topology Paper Assignment 1 Unit 3 Mr. Swailes The study of Network Topology recognizes 8 basic topologies * Point to point * Star * Bus * Mesh * Tree * Hybrid * Daisy chain * Ring Point to point- The simplest topology is the permanent link between two end points Star-in a local area network with a star topology. Each network host is connected to a central hub with a point-to-point connection to a central node called a hub or switch. Bus- In local area
Words: 641 - Pages: 3
Antivirus is a computer software that has the capability to prevent and protect your computer from dangerous malicious codes. This software can offer a peace of mind even for experienced computer users, who doesn’t want to mess up with viruses. Antivirus programming works in two different ways. Firstly, it has a huge "lexicon" of virus database and it sweeps the files and documents in a system and tags them if they are known to be viral and also it screens the framework of any suspicious action
Words: 795 - Pages: 4
Antivirus is used to detect and remove virus in a computer, smartphones, tablets and other technical devices. Before knowing about the antivirus lets first study why antivirus is use and how it is used and what it is. Now the first question arise is what is the need to use antivirus so the answer is computer virus yes because of computer virus we use antivirus. A computer virus is a mischievous computer program. It enters in the computer without the permission or without the knowledge of user and
Words: 1444 - Pages: 6
equitmet. The best network for a small group is the Ad-Hoc. This network is the smallest and most basic network. using this network will allow two laptops or two tablets to create their own two node network. This network is perfect yet sutable for 2-3 people. Its perfect for a company that is just now atarting out. Along with this you will be allowed to conect networks together to share files, music, pictures, notes or anything you possobley need to share from one computer to
Words: 708 - Pages: 3
ASSIGNMENT 3 1. Using only the following protocols (ARP, DNS, HTTP, ICMP, IP, NTP, RTP, UDP, TCP), describe the steps involved when the Internet host red.color.net pings another host green.paint.net. Describe this step by step, in detail- what happens in each host. Assume all caches are empty (i.e. No name or address resolution has been done, yet) You have to think through the whole chain of how address discovery works and what protocols are used at every step. Let red.color.net be Host A with
Words: 977 - Pages: 4
At the accounting firm, I have discovered several vulnerabilities in regards to the organizations network security. Starting with the current router, the NetGear WGR614 is an 802.11b wireless networking device originally released in 2002, it only has wired equivalent privacy (WEP) security, and has an approximate 1650 Ft. range. While the use of this router may deter the most basic intrusion attempts from individuals searching for quick access to a network. It was originally produced over 14 years
Words: 558 - Pages: 3
In the previous upgrade five years ago, the school administration chose cabling with a view to make subsequent upgrades to faster networking technology, simpler and more cost effective. The majority of users in the current network are desktop users; the desktops have Gigabit network interfaces. The current network cabling is Category 6 Twisted Pair Ethernet cabling, connecting to Ethernet network switches. These switches are capable of Gigabit connectivity. Cat6 Ethernet cable is commonly
Words: 946 - Pages: 4
satisfy the school’s requirements, I created the following network design which has six pats. Figure 4 - Network design Sections Data center: All the servers have two connections to the core layer, in case one layer 3 switch fails for any reason. Core layer: The layer 3 switches provides high bandwidth between all layers and great redundancy in this level. Distribution layer: The routers are using as a routing protocol EIGRIP. Access layer: This layer connects the users with the routers
Words: 1684 - Pages: 7