Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

C3top1 Tadeo Pamatmat Deleon

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Chapter 3

Methodology

Topology Diagram

The figure shows the use case diagram which will use for the topology. The

topology will be virtual and be made with the Packet Tracer. It includes the models that

will be available in our Packet Tracer like Switch, Router, Cables, and etc. It will visually

express how our topology will be operated internally and externally. The process starts

with three stores that has different IP addresses. Each Store has different computer, one
for the owner, manager, cashier and the customers who will use a wireless connection.

The owner has the all features that the others cannot use. Security also applied in the

topology

You might also like