-
Give me the mailbox, it's just that you give less points, if there are 20 points, I can help you finish it and show you about it:
Table of Contents. Abstract 1
II School Description 3
III. Needs analysis 4
Bandwidth 4 Subnet and VLAN Planning 4
Information services implemented 4
Application 5
Storage System Analysis 5
System and data security analysis 5
QoS 5 Inter-Network Isolation 6
4. Topology diagram and overall description of the scheme 7
Backbone network transmission scheme design 7
Internet Access Scheme 7
Remote access support 8
Subnet partition 9
Design of inter-network isolation scheme 12
Storage Scenario 13
Equipment Selection 13
Software 14Information Services Scheme 14
Cabling scheme 15
Structured Cabling Design 15
Cabling system 16
Design Goal 17
Workspace Design 18
Trunk area design 19
Sub-wiring room design 20
Main wiring booth design 21
V Network management 22
Network Management 22
Remote monitoring 22
Make a client installation disk 22
Configure client 23
Remote control 23
Cybersecurity 24
VI. Main equipment of the system** 26
7. Network testing and protocol packet analysis 27
Ref. 31
Acknowledgments 32
-
Since a computer network is a very complex system, a structured design approach is often adopted in order to simplify its design.
Computer network architecture refers to the logical structure and function distribution of the entire network system. A computer network system is a very complex system. The structural design approach of breaking down a complex system into several easy-to-handle systems and then dividing and conquering them is the most common method used in engineering design.
Layering is one of the best ways to decompose a system.
The benefit of hierarchies is that each layer implements a relatively independent function. The hierarchical structure also has one thing to do with communication, understanding and standardization. The hierarchy of computer networks is generally represented by a vertical hierarchical model.
-
This seems to be gray and simple, it is the conventional home network department, the home Internet will have a junction box indoors, home decoration needs to be offline from the junction box to each room that can use the network network cable (whether you use it or not, wiring is a must), class A twisted pair, cat and wireless router depending on the home improvement reservation situation, standard connection: the outer line into the box is replaced with a multi-** junction box, then the cat and the router can be put into the junction box at the same time, the outer line and the cat connection; The cat is connected with the router, and then the route is connected with the network cable of each house, so that no matter which house the notebook can enter the Internet through wired or wireless connection, the mobile phone enters the Internet through wireless, and the gateway is:, IP allocation:
As long as you find two of your favorites in the middle, you can allocate two notebooks respectively, note that the IP cannot be repeated and in addition to the gateway, such as: one is used, the other one is available, not the same 6 or the same 8, subnet mask:, so that the entire home network is successfully configured and can be used.
I found two pictures on the Internet, you see:
Wiring diagram of three bedrooms and one living room.
Network Logic Diagram:
-
No one answered that I'll join in the fun, the separator picks up the cat, the cat connects to the WAN port of the router, since it's a wireless router, then let other devices access the Internet wirelessly, configure it, connect a computer to the LAN port of the router with a twisted pair, open the router, generally enter the router management page in the browser, and the next....No, the network segment, subnet mask, and IP are assigned to these devices from one to another....
-
1.Signal splitter - modem - wireless router - desktop, laptop, mobile phone in parallel. (Desktop wired, laptop phone wireless).
2.The outer port of the wireless router dynamically obtains the IP address, and the inner port is used as the gateway, which is given to the desktop, and then to the notebook and mobile phone. It's a mask.
3.First, set the external port of the router to PPPoE dial-up Internet access, and set the account password given by the operator. The inner port is set to the address range.
4.It can be obtained automatically, or it can be set manually, if it is set manually, it can be set by pressing the plan in step 2 of the button.
-
A simple schematic diagram of the connection, chasing if there is a problem.
-
The variable-length subnet mask is the use of unclassified addresses. Since there are 40 hosts per subnet, it is sufficient to select 6 bits to form the host number. The seventh and eighth digits from the bottom are the network numbers, 00, 01, 10, 11.
And the host number cannot be all zero or all one, so the four subnets are 0001) 1110); 0001) 1110); 0001) 1110); 0001) 1110)
-
1. Communication traffic.
2. Core layer, aggregation layer and access layer.
3. Management station, **, management information base, network management protocol 4, configuration management.
5. Transmission medium and line management hardware.
Performance management. And 8 I won't either, I'm so sorry!
-
Now you want to divide the network into 6 subnets.
Directly apply the calculation formula of subnets When the number of subnets = n=3 of 2, the requirements can be met (when n=2, only 4 subnets can be divided), that is, it is necessary to borrow three digits on the host bit to divide the subnet (the host bit is still 5+8=13).
That is, the subnet mask is.
It can also be calculated that the number of hosts that can be accommodated in each subnet = (2 to the 13th power - 2) = 8192-2 = 8190
We can deduce the address block of each subnet = 256-224 = 32, then the subnet and its host range can be deduced.
Subnet (Network Address) Valid IP address (desirable range) 0
Eight subnets, 6 of which can be used arbitrarily.
The main functions of computer networks include data communication, resource sharing, centralized management, enabling distributed processing, and load balancing. The details are as follows: >>>More
Generally, the computer network is called Ye Zheng to do the business network. A communication network is called a transport network. >>>More
The content of Computer Networks and Communications covers the basic concepts, principles, technologies and applications of computer networks and data communications, and reflects the latest progress of data communication and computer network technology. It mainly includes computer network overview, data communication basics, network architecture, local area network, communication network and wide area network, network interconnection technology, Internet, network operating system, network management and security technology, network comprehensive experiment, etc. >>>More
Turn to Zhihu. I don't know if your school is a key university or an ordinary university, there must be a difference in the level of the exam between the two, taking myself as an example, the university I went to is not a key university, so the content of the exam is not particularly difficult, but cheating is definitely not allowed, cheating is to be punished and may postpone graduation, so under normal circumstances, the usual class listens carefully and prepares for the review of computer basics two weeks before the exam is completely sufficient. >>>More
Which version, the fifth edition of the computer network after-class answers edited by Xie Xiren are at the back of the book, and the answers are also available on the Internet.