0% found this document useful (0 votes)
69 views17 pages

6 Network Topologies

The document discusses different network topologies including ring, mesh, star, bus, and hybrid topologies. In a ring topology, computers are connected in a circular fashion, passing a token from one computer to the next to regulate transmission. A mesh topology randomly connects all computers to each other. A star topology connects all computers to a central hub to regulate transmission.

Uploaded by

Rashad Mahmood
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views17 pages

6 Network Topologies

The document discusses different network topologies including ring, mesh, star, bus, and hybrid topologies. In a ring topology, computers are connected in a circular fashion, passing a token from one computer to the next to regulate transmission. A mesh topology randomly connects all computers to each other. A star topology connects all computers to a central hub to regulate transmission.

Uploaded by

Rashad Mahmood
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Instructor: RASHAD MAHMOOD

IT-Specialist
Microsoft Certified Network System Engineer
Microsoft Certified Network Administrator
Cisco Certified Network Administrator
NETWORK TOPOLOGIES
 In a ring topology, each computer is connected directly
to the next computer in line, forming a circle of cable.

 It uses token to pass the information from one


computer to another.
 Every computer is connected to the next computer in
the ring, and each retransmit what it receives from the
previous computer.

 The message flow around the ring in one direction.


Since each computer retransmits what it receives, a
ring is an active network and is not subject to the signal
loss problem a bus experience.

 There is no termination because there is no end to the


ring
 Token passing a method of sending data in a ring.

 A small packet called the token passed around the ring to each
computer in turn.

 If a computer has information to send, it modifies the token, adds


address information and the data and sends it down the ring.

 The information travels around the ring until it either reaches its
destination or returns to the sender.
 Token passing a method of sending data in a ring.

 A small packet called the token passed around the ring


to each computer in turn.

 If a computer has information to send, it modifies the


token, adds address information and the data and sends
it down the ring.

 The information travels around the ring until it either


reaches its destination or returns to the sender.
 1. All the computers have equal access to the network.

 2. Even with many users, network performance is even

 3. Allows error checking, and acknowledgement.


 1. Failure of one computer can affect the whole
network.

 2. It is difficult to troubleshoot the ring network.

 3. Adding or removing computers disturbs the network.


 The network must operate reasonably under a heavy
load.

 A higher-speed network is required.

 The network will not be frequently reconfigured.


 Mesh topology is a type of networking in which all the computers are
inter-connected to each other.

 In Mesh Topology, the connections between devices take place


randomly.

 The connected nodes can be computers, switches, hubs, or any other


devices.

 In this topology setup, even if one of the connections goes down, it


allows other nodes to be distributed.

 This type of topology is very expensive and does not have any
hierarchy, interdependency, and uniform pattern between nodes.

 The connections of the mesh topology are not easier to establish.


 1. Because of the dedicated link, no traffic between
computers.

 2. Failures of one node computer not affect rest of the


network.

 3. Because of the dedicated link privacy and security


are guaranteed.

 4. Point to point links make fault identification and


fault isolation easy.
 1. Due to the amount of cabling and number of input
output ports, it is expensive.

 2. Large space is required to run the cables.

 3. Installation and reconfiguration are difficult.


 1. Direct transmission is required for privacy reason.

 2. Need to have dedicated link for fast transmission.


 The star bus topology combines the bus and the star,
linking several star hubs together with bus trunks.

 If one computer fails, the hub can detect the fault and
isolate the computer.

 If a hub fails, computers connected to it will not be


able to communicate, and the bus network will be
broken into two segments that can not reach each other.
 Often a network combines several topologies, as sub
networks linked together are a large topology.

 For instance one department of business may have


decided to use a bus topology while another
department has a ring.

 The two can be connected to each other a central


controller in a star topology.

You might also like