Вы находитесь на странице: 1из 4

Ted Huskey

June 25, 2017


(Rev 1.0 September 2018)
CSOL 500
Module 5: Topology
The network topology that I have chosen to exam is for a small office/home office
(SOHO) Figure 1. This Star topology is ideal for both the home or small office in that is
provides ease of use and growth flexibility. The hardware components tend to be located
in, relatively, close proximity to each other making pulling cables or receiving WiFi very
manageable and not cost prohibitive. Another attractive feature, since we are talking
SOHO, of a Star topology is its low administrative and maintenance overhead – it’s a
very manageable network – ideal for small/lean office or the home. A further word on
the flexibility of a Star topology; SOHO networks’ size ebbs and flows, with users
coming and going or peripherals being added or removed. Adding or removing
hardware/users is very easy, is not an expensive event and does not require
reconfiguration of the entire network.

Figure 1
A SOHO network consists of a router, firewall, switch, server, WAP and users terminals
(laptops, workstations, tablets or phones.
The router connects the SOHO network to the Internet and in some cases the router may
have firewall functionality built in.
The firewall protects the SOHO network/LAN from attacks and threats from the Internet.
It is the critical protection device that filters out junk data packets.
The switch is a key enabler of the Star topology that provides connectivity between the
different users (wired and wireless) and the server
The Wireless Access Point (WAP) is a base station that provides connectivity between
the wireless devices and the switch. The WAP can be an area of exploitation if proper
security policies are not in place and enforced.
The server is a computer that provides data to the users on the network.
The users, both wired and wireless, present the greatest threat to, but at the same time
provide the greatest defense for, network security. The users have direct access to the
network and could inflict significant harm. Likewise, with the proper training and
security policies and practices, these same users could the strongest component of the
network’s security.
References
Computer Networking Demystified. (2013, June 7). Retrieved from
https://computernetworkingsimplified.wordpress.com/2013/06/07/how-will-a-typical-
small-officehome-office-soho-lan-look-like/

Network Diagram Software LAN Network Diagrams & Diagrams for LAN Physical
Office Network Design. Retrieved from http://www.conceptdraw.com/How-To-
Guide/LAN-Diagrams

Bosworth, S., Kabay, M. E., & Whyne, E. (2009). Computer Security Handbook 6th.
Hoboken, NJ: John Wiley & Sons.

Вам также может понравиться