Network Diagrams


The following network diagram is created as a business network.  What I have laid out is that in a typical business, you will always have many computers within that building, so each PC represents so many users (no reason to fill up the chart with PCs).  Also, there are usually network printers involved in these buildings, so it was best to include them in this diagram.  There are monitoring devices in place to check for unwanted behavior from all aspects of this layout (better safe than sorry).  Within this complex business diagram, we have a separate server for DNS, Web, Email, File & Print, Applications, and Firewall.  We want to be as protected as possible.  Most lines are running via Ethernet except the main line which is a fiber optic to push that much bandwidth to the switches, which in turn push the condensed/shared bandwidth to the devices.  We also have this business being connected to it’s other office in Chicago to share information amongst each other within the restrictions in place:

The next diagram is a very simple, yet effective diagram which gives two examples of cloud-based networking.  I know people who don’t quite understand what “the cloud” is, so I thought a simple diagram could help.  In this case we see on the left that the cloud is serving as a large structure that holds each users information privately.  This information is not shared amongst each other, but each user individually has access to their cloud-based files and information.  On the right, we see a cloud-based server that shares all of its files and system with anyone who connects to use it.  This is more open and users can share or download anything that is offered on the cloud:

The final diagram here portrays a typical home setup for a network.  Usually this is nothing fancy, but it gets the job done in most cases.  The modem connects to the router (which has its own security options), and then the router gives network access to all of the devices in the home.  In this case we have two desktops being connected via Ethernet cables, a laptop that uses WiFi, two smartphones that access via WiFi, a network-enabled television that access via WiFi, and a gaming system that is connected via Ethernet.  Every home is different, of course, but typically I feel a lot of homes are now using similar devices and setups to this.  Let’s just hope they learned to use the security measures available to them on the router, PCs, and by now have their WiFi secured.

Comments are closed.