Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
164 views2 pages

Home Network Star Topology Guide

The document provides a topology map of a home network laid out in a star configuration. It depicts over 50 connected devices, including computers, smart TVs, phones, appliances, security cameras, and peripherals. Several firewalls are placed throughout the network to protect devices and prevent intrusions. The network uses both wireless and wired Ethernet connections. Traffic flows are shown between devices with expected bandwidths labeled in megabits per second. Encryption is used for secured data transmission and storage.

Uploaded by

api-593553065
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
164 views2 pages

Home Network Star Topology Guide

The document provides a topology map of a home network laid out in a star configuration. It depicts over 50 connected devices, including computers, smart TVs, phones, appliances, security cameras, and peripherals. Several firewalls are placed throughout the network to protect devices and prevent intrusions. The network uses both wireless and wired Ethernet connections. Traffic flows are shown between devices with expected bandwidths labeled in megabits per second. Encryption is used for secured data transmission and storage.

Uploaded by

api-593553065
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Topology Mapping of a home Network (LAN Network)

The following Topology map depicts a home network as a Star Topology. Advantages of a star topology make installation and wiring easiest.
There are no needed disruptions to the network when connecting or removing devices. It is a little more expensive than other topologies
since it required more cable lengths. I have included 50+ devices from various connected IT/LoT devices. I have identified large and small
firewalls to help protect the network and prevent intruder penetration. Beyond the main entrance of the home is a large firewall to help
identify authorized vs. non-authorized access. If an intruder breaches the system, they will encounter various smaller firewalls. There are
several firewalls within the computer system. Since the security systems are Ring and ADT, they are controlled by another party. This home
network is not in control over those networks. They exist outside of the network. They are placed on the map to show access from cell
phones to see intruders or packages delivered and exterior stored data through cloud use. I have indicated internet and cloud storage
devices. Included in my mapping are routers, switches, hosts, wireless access points, and other peripherals found within the network. In
most cases, I have identified the flow direction of a device unless it has been repeated several times, in which case to preserve spacing, flow
was not indicated. The protocol types are indicated. Anticipated traffic flow is indicated in megabits per second (MBPS) on some items to
give an example. Encrypted connections or data is labeled and when necessary, in transit vs. at rest is marked. The internet uses a WAN
network. This home uses a LAN Network. Data flow is mostly bi-directional with the exception of things like the video camera, refrigerator,
washer, dryer, coffee machine, etc.

 
Security Personal Mouse Scanner Security
Camera Computer Topology Map of Yuen’s Network (LAN Network) Smart TV (25 MBPS) Camera
(40 MBPS) Smart TV IP Address
Enc 14 Megabytes Iphone Data in transit
rypt Secure Fax (25 MBPS) 86.753.092.228
ed Printer per second Encrypted
Data Laptop
stored Encrypted

it
Encrypted Share file

ns
Host s back and

tra
Android passwords/data Secure Router forth Data in transit
Device

in
Et Encrypted Personal Encrypted
he Playstation Xbox

ata
rn Computer passwords/data

D
et 10 Ipad 10
Ca (40 MBPS)
ble MBPS MBPS Firewall Cricut
Host B s Bridge
Mouse
(Data at rest) 2-3
Firewall MBPS Secure
Electric Car En Sha
cry r e fi Host C Data

Ethernet Cables
pt e les s
d b ack ble g stored
and et Ca in
er n ar
res
t Wireless access point fo r
th Eth Sh
at fice
ta /Of
Da m
sit

Bed oo Cricut
ft R
ran

ro om Cra Host
2-3
in t

(Data at rest) (Data at rest) Garag Device


e Access Point MBPS
ta

Security
Da

Share files
Camera Router
Kitchen Firewall Sha Firewall
re f WPA2 encryption
Copper Wire i les Encrypted with AES Internet
Washer Dryer b ac
Coffee Tee ka Secure Data
Firewall n nd TCP/IP
Machine Ro f or stored in Cloud
Refrigerator r om th &
D oo WAN (WAN)
o nt Switch
/Fr
om Host A Eth
Ro er Personal (40
riz
ed i ng Alexa ne t
Laptop th o Liv Laptop Ca
b le
Computer MBPS)
(added security n Au s g
U n
Firewall ted Wireless access point ari
for phone data) Encryp Sh Mouse
Secure Data
(Data at rest)
stored in Cloud
Data in transit Router Firewall Printer
Security Secure Data
Cloud Cell
Camera stored
Internet Phone
Wireless Router Data in transit Host
(WAN) Device
Tv Security Smart TV (25 MBPS) Security
(WAN) 10 Data in transit
Dvd Camera Camera
Player MBPS
Encrypted
ized Ring Wii Laptop
ho r
Aut Firewall Security

(Data at rest) Iphone


Only authorized users Ipad
beyond this point Blu Ray Projector Host D
Security Modem Wireless access point Ipad

You might also like