6 Network Topologies

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

Instructor: RASHAD MAHMOOD

IT-Specialist
Microsoft Certified Network System Engineer
Microsoft Certified Network Administrator
Cisco Certified Network Administrator
NETWORK TOPOLOGIES
 In a ring topology, each computer is connected directly
to the next computer in line, forming a circle of cable.

 It uses token to pass the information from one


computer to another.
 Every computer is connected to the next computer in
the ring, and each retransmit what it receives from the
previous computer.

 The message flow around the ring in one direction.


Since each computer retransmits what it receives, a
ring is an active network and is not subject to the signal
loss problem a bus experience.

 There is no termination because there is no end to the


ring
 Token passing a method of sending data in a ring.

 A small packet called the token passed around the ring to each
computer in turn.

 If a computer has information to send, it modifies the token, adds


address information and the data and sends it down the ring.

 The information travels around the ring until it either reaches its
destination or returns to the sender.
 Token passing a method of sending data in a ring.

 A small packet called the token passed around the ring


to each computer in turn.

 If a computer has information to send, it modifies the


token, adds address information and the data and sends
it down the ring.

 The information travels around the ring until it either


reaches its destination or returns to the sender.
 1. All the computers have equal access to the network.

 2. Even with many users, network performance is even

 3. Allows error checking, and acknowledgement.


 1. Failure of one computer can affect the whole
network.

 2. It is difficult to troubleshoot the ring network.

 3. Adding or removing computers disturbs the network.


 The network must operate reasonably under a heavy
load.

 A higher-speed network is required.

 The network will not be frequently reconfigured.


 Mesh topology is a type of networking in which all the computers are
inter-connected to each other.

 In Mesh Topology, the connections between devices take place


randomly.

 The connected nodes can be computers, switches, hubs, or any other


devices.

 In this topology setup, even if one of the connections goes down, it


allows other nodes to be distributed.

 This type of topology is very expensive and does not have any
hierarchy, interdependency, and uniform pattern between nodes.

 The connections of the mesh topology are not easier to establish.


 1. Because of the dedicated link, no traffic between
computers.

 2. Failures of one node computer not affect rest of the


network.

 3. Because of the dedicated link privacy and security


are guaranteed.

 4. Point to point links make fault identification and


fault isolation easy.
 1. Due to the amount of cabling and number of input
output ports, it is expensive.

 2. Large space is required to run the cables.

 3. Installation and reconfiguration are difficult.


 1. Direct transmission is required for privacy reason.

 2. Need to have dedicated link for fast transmission.


 The star bus topology combines the bus and the star,
linking several star hubs together with bus trunks.

 If one computer fails, the hub can detect the fault and
isolate the computer.

 If a hub fails, computers connected to it will not be


able to communicate, and the bus network will be
broken into two segments that can not reach each other.
 Often a network combines several topologies, as sub
networks linked together are a large topology.

 For instance one department of business may have


decided to use a bus topology while another
department has a ring.

 The two can be connected to each other a central


controller in a star topology.

You might also like