Preview

Netw206 W1 Assignment Essay Example

Powerful Essays
Open Document
Open Document
789 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Netw206 W1 Assignment Essay Example
Support for High-Definition IP Cameras
DeVry University
NETW206: Introduction to Switching

Submitted to:
Professor:
Date: Current date

As per the requirement, we are going to use the Cisco 4300 Video Surveillance model camera in here. So we have to have a good reliable switching architecture for getting the maximum throughput from these cameras. Otherwise they are acting as just ordinary video camera. When we are speaking about the switching architecture of this project, first of all we have to fulfill some major requirements. They are, 1. Must comply with the Cisco hierarchical design model; 2. Must provide physical, as well as logical, redundancy; 3. Must integrate 1Gb uplinks; 4. Must segment camera IP traffic from the existing network for security reasons; 5. Must support a minimum of 150 cameras; 6. Must utilize PoE for cameras to avoid the use of power bricks or power injectors; 7. Must provide sufficient bandwidth for full HD support; and 8. Must minimize rack space.
First of all we’ll discuss about the Cisco hierarchical design model. The Cisco hierarchical design model is a three-tiered or layered network model that is used to design and engineer data communication networks. These three tires are, * Access layer - The access layer interfaces with end devices, such as PCs, printers, and IP phones, to provide access to the rest of the network. The main purpose of the access layer is to provide a means of connecting devices to the network and controlling which devices are allowed to communicate on the network. * Distribution layer - The distribution layer aggregates the data received from the access layer switches before it is transmitted to the core layer for routing to its final destination. The distribution layer controls the flow of network traffic using policies and delineates broadcast domains by performing routing functions between virtual LANs (VLANs) defined at the access layer. VLANs allow you to

You May Also Find These Documents Helpful

  • Powerful Essays

    Netw410 Week 3 Lab

    • 629 Words
    • 3 Pages

    5. Does this network require a distribution layer? What devices would operate at the distribution layer? What would these devices be responsible for? Could the access and distribution layer be combined into a single layer? Draw a diagram of these devices at the distribution layer. Label all of the devices.…

    • 629 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Studying the seven layers of the OSI design, a decision to be taken is that the layer three, also referred to as the network layer is the one which WAN protocols operates on. The network layer carries out regular tasks as well as pinpoints end-to-end addressing and routing datagrams (Regan, 2004). There exists a unit known as brouter that some layers incorporate which works like a router and a bridge. Routers and switches work on layers 2-4 (data link layer, network layer as well as transport layer). As mentioned earlier, on layer two of the OSI model, network layer, is the place where the addressing and routing is carried out. On the transport layer of the OSI model is the place where the flow control and mistake handling works. Lastly, on layer four the synchronizations and assemblies are completed.…

    • 254 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 4.1 Case Study

    • 2532 Words
    • 11 Pages

    Using the description of Network C and Figure 4- 6, create a cabling solution for this network that meets the owner’s needs. Justify your choices.…

    • 2532 Words
    • 11 Pages
    Good Essays
  • Good Essays

    In order to provide speed and reliability, large and enterprise-level networks today are typically constructed in multiple layers. They are the access layer, also called the network edge layer, the aggregation or distribution layer; and the network core layer. The access layer is usually a mesh of network switches, linked to other switches in the aggregation layer, which in turn is linked to the core.…

    • 681 Words
    • 2 Pages
    Good Essays
  • Better Essays

    INDP Final Project

    • 3551 Words
    • 12 Pages

    * The administrative departments run off of a 1000 Base-T Ethernet provided by a CAT 6 cable…

    • 3551 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    These are the system binary files that the system needs to run for all users…

    • 627 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    (TCO 1) What command do you type to save the configuration stored in RAM to NVRAM?…

    • 561 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    * Domain members rely heavily on DNS services to locate domain resources. For example, when a domain-joined computer boots, it queries domain Service Locator records (SRV) in DNS to locate a Domain Controller against which to authenticate. Without a local DNS instance, this process has to take place over a potentially slow site link. Of course, once a computer has located a Domain Controller, it will continue to authenticate against that server until it something forces the client to find another DC.…

    • 636 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Peachtree is an accounting software program sold by Sage, whose parent company is the Sage Group. The software is geared for use by small- to medium-sized businesses and has progressed through several generations over the years since its conception. Initially, Peachtree was sold by Peachtree Software, a company that was established in 1978. Peachtree accounting software was acquired by the Sage Group in 1998.…

    • 3450 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Constant stream of multimedia traffic between offices – average file size 25MB; file transfers less than 5 seconds…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    James Cash Penney opened his first store located in Kemmerer Wyoming in 1902, at the age of 25. The first store was opened in partnership between Penney, T.M Callahan and Guy Johnson as a ‘cash only’ store, refusing to take mining script or extend credit. Investing his entire savings of $500, Penney had to borrow $1,500 and was cautioned against his ‘cash only’ policy, as other stores in mining towns had been failing. The store was a success in spite of bankers warnings earning $28,898 in sales. Within two years Penney bought out Callahan and Johnson, and Penney had taken over their three other stores. Expanding rapidly, by 1915 there were 83 stores and by 1917 there were 175. Currently there are over 1,200 with over 205,000 employees stores ranging from the all 50 states as well as Puerto Rico, Mexico and Chile, the company is currently headquartered in Plano Texas.…

    • 1525 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    Combines layers 5, 6 and 7: provides network services such as email, file transfers, exchanges of data, support connections between sessions and inner host communications…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 5 Lab 1 Answers

    • 4778 Words
    • 20 Pages

    Ethernet Networks in Review Ethernet Cabling Data Encapsulation The Cisco Three-Layer Hierarchical Model Summary Exam Essentials Written Labs Review Questions Answers to Review Questions Answers to Written Lab 2.1 Answers to Written Lab 2.2 Answers to Written Lab…

    • 4778 Words
    • 20 Pages
    Powerful Essays
  • Better Essays

    Adam’s Equity Theory is a model of motivation which basically states that employees will perform at a more productive rate if they feel that they are being treated fairly (Kreitner & Kinicki, 2010). Equity is achieved when a worker perceives their reward for their amount of work to be equal to that of a relevant worker. Negative inequity is perceived by the employee when the relevant worker receives greater rewards for the same amount of work. Positive inequity is perceived by the employee when the relevant worker receives fewer rewards for the same amount of work (Kreitner & Kinicki, 2010).…

    • 2393 Words
    • 10 Pages
    Better Essays
  • Good Essays

    In the cisco environment the network management architectures almost always have the same basics, when it comes to its computer systems network tools and devices or software to help with maintenance, prevention and the recognizing of problems. Problems that can become bigger issues if network management is not in placed, as entities are programmed to take actions.…

    • 553 Words
    • 3 Pages
    Good Essays