โ„น๏ธ Help and Documentation โ„น๏ธ

This tool allows you to create and visualize network topologies. Follow these steps:

  • ๐Ÿ‘‰๐Ÿฝ Enter the number of nodes and select an office size, then click 'Submit'.
  • ๐Ÿ‘‰๐Ÿฝ Click on the canvas to add more nodes if needed. The nodes will be placed randomly within the office dimensions.
  • ๐Ÿ‘‰๐Ÿฝ Use the 'Simulate Data Transfer' button to visualize data flow between nodes.
  • ๐Ÿ‘‰๐Ÿฝ Use the 'Export as PNG' button to save your network topology as an image.
  • ๐Ÿ‘‰๐Ÿฝ Can remove node by right-clicking on a node, which removes it from the topology.
  • ๐Ÿ‘‰firewall: A firewall helps protect your network by filtering incoming and outgoing traffic based on an organization\'s previously established security policies.
  • ๐Ÿ‘‰ vpn: A VPN (Virtual Private Network) provides a secure connection over the internet, encrypting your data and hiding your online activities.
  • ๐Ÿ‘‰encryption: Encryption ensures that data sent over the network is protected from unauthorized access by converting it into a secure code that can only be decrypted by authorized parties.
  • ๐Ÿ‘‰ids: An IDS (Intrusion Detection System) monitors network traffic for suspicious activity and alerts the network administrator to potential threats.

Examples:

For a small office with 5 nodes, choose the small office size and enter 5 as the number of nodes. You will see a ring topology suggested.