Types of Network Diagrams

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here

Types of Network Diagrams:

It’s critical to know how to create and read network diagrams. These diagrams are a graphical presentation of activities and their interconnected functions. Diagrams are a key management tool. They’re done with two methods:

  • Precedence Diagram Method
  • Arrow Diagram Method

Precedence Diagramming Method:  These diagrams are also known as Activity on Node Diagrams (AON) as the activity including pertinent information listed on the node. AON is applied to the scheduling of activities. The method uses boxes (known as nodes) to reflect the activities. The connection between the activities is demonstrated with the help of arrows.

Start Date: The earliest date when the project can start

Duration: The duration for which the activity will last

Finish Date: The earliest date by which the activity can finish

Late Start: The latest date by which the project can start

Late Finish: The latest date by which the project can finish

Slack Period: The difference between the early start date and late start date

Finish to Start: The most common dependency type. The start of the successor activity is dependent on the completion of the successor activity.

Finish to Finish: The completion of the predecessor activity controls the completion of the successor activity.

Start to Start: The start of the successor activity depends on the start of the predecessor activity

Start to Finish: The completion of the successor activity is controlled by he start of the predecessor activity.

Arrow Diagramming Method: This is the method… 

View Topics

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?