Network Diagram Example

In: Computers and Technology

Submitted By taddo
Words 275
Pages 2
The attached sample is a basic network for a small office. This network will allow access to the internet and the server could house an intranet or extranet. A cable internet connection will allow for high speed internet access. In addition to the basic network, wireless LANs could be added and a mobile Wi-Fi network. An internet service provider will allow access for Wireless LANs and the Mobile Wi-Fi.

Workstations/PC Wired LANs : office computers connected to one another and other devices within a 500 meter radius. They can be computers connected in the same building or buildings close by. Workstations may be specialized for graphic design, 3-D design or CAD. As the company grows they could add WANs to reach further distances.

Server: Determines who gets what. It stores data, serves up web pages controls the operating system. An example of server software would be Microsoft Windows. It could also serve applications for users on an intranet. For example a company website for employees or portal that houses company information and resources.

Switch : Are similar to hubs connecting network components but they can filter more data to a specified location.

Router: Helps to communicate with the internet making sure data gets to the correct address.

Firewall: Prevents unauthorized users from accessing personal networks. It makes sure users have authorized access to use the network.

Internet: Communication system linking millions of people and networks from all over the world. An ISP will allow for permanent connection to the internet.

Laudon, K., & Laudon, J. (2014). Essentials of management information systems: Managing the digital firm (13th ed.). Upper Saddle River, NJ: Prentice…...

Similar Documents

Network Diagram

...desktops FS Start: Mon 3/4/13 ID: 16 Finish: Tue 3/5/13 Dur: 2 days Res: Network Technician | Connect 5 printersStart: Wed 3/6/13 ID: 17Finish: Wed 3/6/13 Dur: 1 dayRes: Network Technician | | | | | | Connect 5 printersStart: Wed 3/6/13 ID: 17Finish: Wed 3/6/13 Dur: 1 dayRes: Network Technician | | | | | FS 6 gaming consoles FS Start: Thu 3/7/13 ID: 18 Finish: Thu 3/7/13 Dur: 1 day Res: Network Technician Connect T‐3 Modem with Cat‐5 FS Start: Fri 3/8/13 ID: 19 FS Finish: Fri 3/8/13 Dur: 1 day Res: Network Technician Connect desktop to internet Start: Mon 3/11/13ID: 21 Finish: Mon 3/11/1 Dur: 1 day Res: Network Technician | Connect desktop to printersStart: Tue 3/12/13 ID: 22Finish: Tue 3/12/13Dur: 1 dayRes: Network Technician | | | | | | Connect desktop to printersStart: Tue 3/12/13 ID: 22Finish: Tue 3/12/13Dur: 1 dayRes: Network Technician | | | | | FS | Connect gaming consoles to inStart: Wed 3/13/13ID: 23Finish: Wed 3/13/1 Dur: 1 dayRes: Network Technician | | | | | | Connect gaming consoles to inStart: Wed 3/13/13ID: 23Finish: Wed 3/13/1 Dur: 1 dayRes: Network Technician | | | | | FS | Create LAN desktops/printers......

Words: 800 - Pages: 4

Network Diagram

...Request for Proposal The first change I would make would be to delete the router going from the firewall to the phone network. I then would separate the phones from the computers. I would put all of the phones and the phone network on VLAN 10. I moved all of the computers that were originally on VLAN 1 & 10 with the phones to VLAN 8. I would then delete the switch linking all of the servers. After that, I want to create a protected network for the application server and the accounting server from the firewall. I then would move the protected network servers to VLAN 4. I would then create another link from the firewall to go to a DMZ containing the Email Server and the Web Server. The DMZ would be moved from VLAN 1 to VLAN 6. The last thing I would do would be to move the wireless access point from VLAN 1 to VLAN 2. By separating everything on the network into different VLANs, I feel it will increase security as well as decrease congestion through the VLANs. Since the VLAN separates portions of the network into mini networks, if an attacker was able to get access to the system, they would only be able to see a small portion of the network instead of everything that is on it. By placing the servers with the most important data (the database and accounting servers) in a protected network, it creates an extra level of security. The last major vulnerability that I discovered is that all of the data is in one place, in the server room. If......

Words: 369 - Pages: 2

Affinity Diagram

...Improvement Module 4 AFFINITY DIAGRAM AFFINITY DIAGRAM 1 Basic Tools for Process Improvement What is an Affinity Diagram? An Affinity Diagram is a tool that gathers large amounts of language data (ideas, opinions, issues) and organizes them into groupings based on their natural relationships (Viewgraph 1). The Affinity process is often used to group ideas generated by Brainstorming. Why should teams use the Affinity process? The Affinity process is a good way to get people to work on a creative level to address difficult issues. It may be used in situations that are unknown or unexplored by a team, or in circumstances that seem confusing or disorganized, such as when people with diverse experiences form a new team, or when members have incomplete knowledge of the area of analysis. When should we use the Affinity process? The Affinity process is formalized in an Affinity Diagram and is useful when you want to (Viewgraph 2)  Sift through large volumes of data. For example, a process owner who is identifying customers and their needs might compile a very large list of unsorted data. In such a case, creating an Affinity Diagram might be helpful for organizing the data into groups. Encourage new patterns of thinking. An Affinity exercise is an excellent way to get a group of people to react on a "gut level" rather than mulling things over intellectually. Since Brainstorming is the first step in making an Affinity Diagram, the team considers all......

Words: 2922 - Pages: 12


...13 Agent-Oriented Novel Quantum Key Distribution Protocol for the Security in Wireless Network Xu Huang, Shirantha Wijesekera and Dharmendra Sharma University of Canberra Australia 1. Introduction Wireless security is becoming increasingly important as wireless applications and systems are widely adopted. Numerous organizations have already installed or are busy in installing “wireless local area networks” (WLANs). These networks, based on the IEEE 802.11 standard, are very easy to deploy and inexpensive. Wi-Fi allows LANs to be deployed without cabling for client devices, typically reducing the costs of network deployment and expansion. As of 2007 wireless network adapters are built into most modern laptops. The price of chipsets for Wi-Fi continues to drop, making it an economical networking option included in ever more devices. Wi-Fi has become widespread in corporate infrastructures, which also helps with the deployment of RFID technology that can piggyback on Wi-Fi. WiFi is a global set of standards, unlike mobile telephones, any standard Wi-Fi device will work anywhere in the world. Other important trends in wireless adoptions are including the introduction of wireless email with devices such as the Blackberry and The Palm VII, rampant digital cell phone use, including the use of short message service (SMWS), and the advent of Bluetooth devices. But the risks associated with the adoption of wireless networking are only now coming to light. A number of impressive......

Words: 6431 - Pages: 26

Ifluence Diagram

...A NOTE ON CONSTRUCTING INFLUENCE DIAGRAMS Influence diagrams were devised as a way to graphically depicting the relationship between several elements that can affect the results of a decision. The diagram can be used as a basis for creating computer-based models that describe a system or as descriptions of mental models managers use to assess the impact of their actions, see Senge (4 ). For more information on influence diagrams see Bodily et al (1) ; Bossel(2); or Plane(3). This note explains some of the basics of influence diagrams and how to construct one. Elements of an Influence Diagram A model is a representation of a system. An influence diagram tries to capture this representation in a form that can be communicated to others. For example, managers could construct an influence diagram to explain their understanding of the system to other managers or to people developing the system on the computer. The elements of the influence diagram are (note: the appropriate color when using color graphics is shown under the symbol): Depicts an external influence (an exogenous variable) – these are variables whose values are not affected by the decision being made. For example, inflation rate is an external influence that can impact a company’s sales revenue. Depicts a decision – these are decisions made by the management. Price charged by a company for a unit of a product could be a decision variable. Depicts an...

Words: 2121 - Pages: 9


...Final Project Resume DESIGN AND IMPLEMENTATION OF INDONESIAN SIGN LANGUAGE RECOGNITION SYSTEM BASED ON FLEX SENSOR WITH ARTIFICIAL NEURAL NETWORK Azizah Izzatur Rahim Program Studi D4Teknik Elektronika Departemen Teknik Elektro Politeknik Elektronika Negeri Surabaya Kampus PENS-ITS, Jalan Raya ITS Sukolilo, Surabaya 60111 Tel: (031) 594 7280; Fax: (031) 594 6114 Email : Abstract As a social creature, humans are very need of communication as a media to make some interaction with others. There are verbal and non verbal communication. Yet, not all of humans are able to communicate well because they don’t understand each other meaning. This kind of problem are often happened in normal people who hard to understand mute people meanings who uses sign language. Meanwhile, translator devices are very expensive and not everyone can buy or even hired a translator also needed a high cost. So, from this union of flex sensor and accelerometer with artificial neural network backpropagation method resulted a sign language translator device which text is as the output on computer that more economic with succeed percentage by 99.2% and failure percentage less by 1%. Moreover, this device can be use as learning and introduction media to normal people to knowing sign language system. Keyword : Sensor Flex, Accelerometer, Backpropagation, Isyarat 1. Background So many ways that human done to communicated each others like conversations, sign language or......

Words: 1254 - Pages: 6

Opc Network Diagram

...Mon 28/4/14 4 wks 6 Mon 31/3/14 4 wks 2 Fri 23/5/14 Mon 26/5/14 12 wks Fri 15/8/14 Pouring of supports Fri 15/8/14 Mon 18/8/14 13 wks 8 7 Pouring of concrete footings Fri 23/5/14 Erect pre-cas Mon 28/4/14 0 wks Fri 25/4/14 Mon 26/5/14 0 wks Mon 18/8/14 0 wks Excavation Fri 25/4/14 Mon 26/5/14 4 wks 10 Fri 20/6/14 Mon 23/6/14 8 wks 11 Fri 15/8/14 Mon 18/8/14 4 wk 12 Mon 31/3/14 0 wks Mon 3/2/14 8 wks 1 Fri 28/3/14 Dres Mon 20/10/14 9 wk Site Cleaning Fri 28/3/14 Steel structure Fri 22/8/14 Roof erected Fri 17/10/14 Mon 3/2/14 0 wks Mon 28/7/14 9 wks Mon 25/8/14 9 wks Mon 31/3/14 8 wks 3 Fri 23/5/14 Mon 18/8/14 4 wks 14 Mon 1/9/14wks Fri 21/11/14 12 5 Fri 12/9 Field subsurface drainage Fri 4/7/14 Mon 26/5/14 14 wks Fri 29/8/14 4 Playing field and track Fri 10/10/14 Other facilities Mon 12/5/14 6 wks Mon 8/12/14 16 wks Fri 2/1/1 Installation of artificial playing turf Fri 2/1/15 Mon 7/7/14 6 wks Mon 13/10/14 6 wks Page 1 wks Fri 14/11/14 Mon 17/11/14 4 wks Fri 12/12/14 ct pre-cast galleries 9 Fri 14/11/14 Pouring seat Fri 12/12/14 ks Mon 17/11/14 0 wks 4 wks Fri 12/9/14 Mon 15/12/14 3 wks 15 Painting Fri 2/1/15 Dressing room 9 wks Fri 14/11/14 Mon 18/8/14 5 wks 13 Fri 12/9/14 Lights Fri 19/9/14 Mon 15/12/14 0 wks Fri 2/1/15 Mon 1/12/14 15 wks Fri 2/1/15 acilities Fri 2/1/15 Fri 2/1/15 wks 0 16 End Fri 2/1/15 Fri 2/1/15 Fri 2/1/15 wks 0 ...

Words: 429 - Pages: 2


... | | UP Template Version: 11/30/06 Note to the Author [This document is a template of a Risk Management Plan document for a project. The template includes instructions to the author, boilerplate text, and fields that should be replaced with the values specific to the project. • Blue italicized text enclosed in square brackets ([text]) provides instructions to the document author, or describes the intent, assumptions and context for content included in this document. • Blue italicized text enclosed in angle brackets () indicates a field that should be replaced with information specific to a particular project. • Text and tables in black are provided as boilerplate examples of wording and formats that may be used or modified as appropriate to a specific project. These are offered only as suggestions to assist in developing project documents; they are not mandatory formats. When using this template for your project document, it is recommended that you follow these steps: 1. Replace all text enclosed in angle brackets (i.e., ) with the correct field values. These angle brackets appear in both the body of the document and in headers and footers. To customize fields in Microsoft Word (which display a gray background when selected): a. Select File>Properties>Summary and fill in the Title field with the Document Name and the Subject field with the Project Name. b. Select......

Words: 1594 - Pages: 7

Networking Diagrams

...common network appliances e.g. Router, and the style of lines between them indicate the type of connection. Clouds are used to represent networks external to the one pictured for the purposes of depicting connections between internal and external devices, without indicating the specifics of the outside network. For example, in the hypothetical local area network pictured to the right, three personal computers and a server are connected to a switch; the server is further connected to a printer and a gateway router, which is connected via a WAN link to the Internet.[1] Depending on whether the diagram is intended for formal or informal use, certain details may be lacking and must be determined from context. For example, the sample diagram does not indicate the physical type of connection between the PCs and the switch, but since a modern LAN is depicted, Ethernet may be assumed. If the same style of line was used in a WAN (wide area network) diagram, however, it may indicate a different physical connection. At different scales diagrams may represent various levels of network granularity. At the LAN level, individual nodes may represent individual physical devices, such as hubs or file servers, while at the WAN level, individual nodes may represent entire cities. In addition, when the scope of a diagram crosses the common LAN/MAN/WAN boundaries, representative hypothetical devices may be depicted instead of showing all actually existing nodes. For example, if a network......

Words: 288 - Pages: 2


...ip IPv4 and IPv6 coexistence (tunneling) protocols Introduction The internet is exponentially growing in size, The number of users of the networks seem to be exploding soon, as nowadays many devices exists that connects through the internet using IPv4 protocol and the amount of those devices has increased in the last few years since not only personal computers and laptops are connected to the network but also devices like smart phones, automobiles with GPS, PDA's, and video game consoles. IPv4 is in trouble since it has no capacity to support all those devices to overcome those situation another methods were developed to extend the life of IPv4 such as : Network Address Translation (NAT), classless inter-domain routing (CIDR), and Length Subnet Mask (VLSM). However, this has not been enough because new technology and devices had emerged, making IPv4 unable to support the technological growth anymore. On February 3, 2011 the Latin American and Caribbean internet Addresses Registry (LACNIC) issued a statement that says that the global IPv4 central address pool which is managed by the Internet Assigned Numbers Authority (IANA) was finally exhausted, according to the global policies agreed by the Internet communities of all regions, on that date the last available IPv4 address blocks were allocated, June 6, 2012 was the selected date by the Internet Society (ISOC) and other organizations in the field as the worldwide launch of IPv6. On that date numerous......

Words: 2121 - Pages: 9


...Portfolio A solid network is considered one of the most critical resources in an organization, both in the private and public sector, especially with paperless transmission of business documents between companies. A solid network is the cornerstone for providing the means of transmitting data (sometimes sensitive), from one computer to another. The mission of any business is to offer a useful product, increase profits, and increase work force potential. Because of these possibilities networks may increase the organizational learning rate, which many business professionals believe is the only fundamental advantage in competition. The accuracy and speed of daily business transactions for large and small organizations are vital to their success. Unscheduled disruptions resulting in the failure to process these daily business transactions can be costly, and potentially disastrous. This essay will describe some of the possible gains, and drawbacks one may face when installing/upgrading a network. Advantages Employees want the ability to have access to all files, and services whenever needed. It is no surprise that our modern workplace is no longer bound to the office. It is a continuous workforce connected globally through the Internet via networks. The new virtual workplace is powered by routers/switches, mobile devices and cloud-based services. IT is challenged by our high mobility lifestyle to support every new mobile device and collaboration solution used......

Words: 641 - Pages: 3

Narritive Description of Network Diagram

...Narrative Descriptions of Network Diagrams for Riordan Manufacturing The set of network diagrams for Riordan Manufacturing consists of five (5) diagrams. They are: 1) Riordan Manufacturing – Network Overview a) This diagram shows the 4 physical locations of Riordan Manufacturing interconnected by a WAN. The WAN connection between corporate headquarters and the China facility is specifically defines as a satellite link. Along with the location pictorial is a listing of the main functions taking place at that location, and also the number of current employees at that location. 2) Riordan Manufacturing Corporate Headquarters a) The network diagram for the corporate headquarters is really a composite of a number of sections: Note the backbone base for this location is 100baseT i) The administration section. Displays the main operational functions: Corporate, HR, etc. with a computer icon that defines the current number of employees in that function, and a description of the computer. There are 36 VOIP telephones in this section. ii) The R&D function, which has 1000baseF network backbone and is totally a MAC based environment. There are 15 employees each with their computers; the section includes 3 high-end color printers and a plotter. The 1000baseF network is connected to the corporate LAN through a switch iii) The servers and an NAS. The servers include WIN server, a WIN Exchange server, a UNIX server, which hosts the corporate SAP ERP SW. All the servers are......

Words: 784 - Pages: 4


...OCI- Diagram Summary The diagram pertains to the client acquisition and the process OCI took when it came to acquiring clients. The majority of their clients were obtain from advertising. The advertising produce many applicants for OCI but many were rejected. The ones that were rejected by OCI was due to couple factors. The first factor was that OCI didn’t think the scope fit OCI objective and it wasn’t feasible in the perceptive, and it was clear why it wasn’t feasible but it could be due to club timeline. Due to these two factor many of the applicants were rejected. Another reason applicant were rejected is because OCI believed that the applicant viewed their organization as cheap labor and they would work like “worker bee”. The organization also acquired clients by personal references. The personal reference usually led to numerous applicant but it also could have the adverse effect on them if a client wasn’t satisfied with the work The diagram also focus on member recruitment which is very important. The club is on a strict timeline because all projects have to be completed by the end of the year. In order for that to happen, all officers and elected officials decision had to be done and approved by October. Member’s recruitment was based on previous member experience. Where the member had a good or bad experience would affect the increase or decrease in the number of perspective member signing up. In most case, some of the members that had a negative......

Words: 1430 - Pages: 6


...are PC dealerships make any difference? Why might they have joined together in the chain? Several change issues will arise; • the imperative to change? Why does the franchise owner want to impose this change – if indeed it is being imposed? • meeting the many and varied individual needs • the implementation process • the changeover process • post implementation support • the nature of the franchisee’s response and the resistance if any In principle, the fact that they are PC dealerships should make little difference, but they will be well aware of the problems of changing over from one software system to another, and interfacing it to other existing systems. The dealers probably joined the franchise network in the first place to share purchasing, advertising and marketing costs. They may pay the franchise owner according to their success, in which case the new system may have a big impact on them as it will declare financial information in a consistent manner across all franchisees and reduce the opportunity for creative adjustments by the franchisees. Q3 Consider the organisation that employs you or where you study. What is its culture? Why does it have that particular culture? What organisational culture would give you most satisfaction as an employee? Where might you find such an employer? Given your preferred organisational culture, what would it mean for you as an employee in terms of your responsibilities and......

Words: 15945 - Pages: 64


...Computer network From Wikipedia, the free encyclopedia "Computer networks" redirects here. For the periodical, see Computer Networks (journal). "Datacom" redirects here. For other uses, see Datacom (disambiguation). Network science Theory · History Graph · Complex network · Contagion Small-world · Scale-free · Community structure · Percolation · Evolution · Controllability · Topology · Graph drawing · Social capital · Link analysis · Optimization Reciprocity · Closure · Homophily Transitivity · Preferential attachment Balance · Network effect · Influence Types of Networks Information · Telecommunication Social · Biological · Neural · Semantic Random · Dependency · Flow Graphs Vertex · Edge · Component Directed · Multigraph · Bipartite Weighted · Hypergraph · Random Cycle · Loop · Path Neighborhood · Clique · Complete · Cut Data structure · Adjacency list & matrix Incidence list & matrix Metrics and Algorithms Centrality · Degree · Betweenness Closeness · PageRank · Motif Clustering · Degree distribution · Assortativity · Distance · Modularity Models Random · Erdős–Rényi Barabási–Albert · Watts–Strogatz ERGM · Epidemic · Hierarchical Browse Topics · Software · Network scientists Graph theory · Network theory v t e A computer network, often simply referred to as a network, is a collection of hardware components and computers interconnected by communication channels that allow sharing of......

Words: 7339 - Pages: 30