Home » Packet tracer & discussion 1 [43]

Packet tracer & discussion 1 [43]


Write 1 thread of at least 250 words. You must support your  assertions with at least 1 citation in current APA format. Acceptable  sources include Cisco material, the Bible, and scholarly journals. You  must also reply to the 2 threads below. Each reply must be at  least 100 words.

Topic: Hierarchal Topology

Question/Prompt: At your workplace or school,  research to determine 1–5 network devices in your hierarchal model.  Create a simple network topology using Packet Tracer software. Place 1–5  devices at the appropriate levels of the Cisco three-layer hierarchical  model design. The model must include:

  1. A labeled hierarchical model ( Access layer, distribution layer, and core layer);
  2. Labeled Type, vendor, and model of the devices (ie. Cisco 2911 series router) ; and
  3. 1 Simulated cloud, 1 PC per subnet to represent a subnet of devices.

If you are unable to do research at your workplace or school, or you  do not have one to research, then create your own hierarchical model.  Share your .pka in the Discussion Board Forum. Do you agree with the way  the network is designed? If so, explain why. If not, state 1 way to  improve the design and why you would make improvements.

Replies(100 words each)

Thread 1 Reply

  Signal flow        

From my understanding we are only a fraction of the pie. We do not  have full access of the network we fall under. The hierarchy can be  related to how the infantry is broken down to fire teams of 4. Yet in an  a platoon theres about 100 people which means theres about 20 fire  teams, creating 20 fire team leaders reporting to the Platoon Sgt who  then reports to the Platoon Commander and then he passes it to the  Company Commander etc. The purpose of having multiple bosses helps to  not overload the main boss with meaningless questions or information not  protaining to them. The way our network is design is to  mitigate unnecessary mistakes made on the network, only affecting us at  our level not disrupting the entire network enterprise.  It also brings a  sense of organization, structure, and management. If anyone has the  proper (AAA) Authorization, Authentication, and Access to be in our  domain to can be part of all broadcasting that may be informative to  them. Also file sharing and the access to the share drive on lower  networks can help not overload the pipeline to the higher echelon of the  network. If you don’t have any business with management or the boss  then just avoid it, communicate between those at your level and later  with the proper authorities your message Will make it to Mr.CEO. The  Hierarchical Model we use in the military could improve if there was a  way to communicate with everyone that shares your Military Occupational  Specialty, is the only improvement I would try to implement

Thread 2 Reply

  Importance of Redundancy        

Since  I was not able to examine a network at school or work, I went to a  small business owned by a family member to see what kind of setup they  had. It turned out that only three employees worked there, so they only  had a very simple point-to-point architecture that consisted of a modem,  a router, and a switch (attached packet- “Office Hierarchy”). Because  of the limited budget and needs, I believe this basic setup fulfilled  their needs adequately. However, one of the downsides of this setup is  that each device is a single point of failure. A key factor of network  stability is implementing redundancy (Yeh & Fiondella, 2017). There  is no device redundancy on this network. As such, I decided I would make  a second diagram that implemented redundancy (“Three Tier Hierarchy”),  even though realistically it would not be possible to implement in the  business I examined. Another benefit that this setup provides is  additional scalability if the company were to hire more employees. In  its current state, this company only has one small switch, meaning the  amount of traffic that can flow through is extremely limited, and it  would be unwise to try to add a lot more users to this network. The  high-capacity switches used in the “Three Tier” diagram would allow more  users to easily connect in. Another way to identify that the smaller  network is not scalable is not only to see if its hardware exceeds its  userbase, but also to ask: If I were to expand my company, would I need  to raze my entire network design and start over? In this case, the  answer is yes—a significant size increase would mean that a fully  different scalable topology, such as a virtual bus, would need to be  created. The business could not function with its current topology. In  conclusion, because the business has not grown in size for fifty years  and is not planning to, I see no need for them to change anything;  however, I would advise them to place a high priority on keeping their  security up-to-date because of the vulnerability of the point-to-point  network.

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more