Explain about mesh topology, Computer Networking

Assignment Help:

Q. Explain about Mesh Topology?

- Dedicated point-to-point links to each other device

- n (n-1)/2 links an every device will have n-1 I/O ports

- Advantages

- Dedicated links - no traffic problems

- Robust

- Privacy/Security

- Easy fault identification as well as isolation

- Disadvantages

- Additional amount of cabling and I/O ports requirement

- Installation as well as reconnection is difficult

- Expensive


Related Discussions:- Explain about mesh topology

Explain typical network topologies, Question: a) Explain briefly three ...

Question: a) Explain briefly three typical network topologies giving one advantage and one disadvantage of each topology. Explain the three topologies with appropriate diagrams

Find the appropriate layer of the OSI or hub, • This device creates one big...

• This device creates one big collision domain and one large broadcast domain.

Point to point architecture - application layer, Point to Point Architectur...

Point to Point Architecture The term  peer means equal which can  be informally  interpreted as a process with  capability similar to the other processes with process communic

WIRELESS COMMUNICATION, how does the near/far effects infulence TDMA system...

how does the near/far effects infulence TDMA system?what happen CDMA system? what are countermeasures in TDMA system/

System deadlock in shared programme structures, System Deadlock A dead...

System Deadlock A deadlock refers to the situation when simultaneous processes are holding resources and preventing each other from completing their implementation. The fol

Permanent virtual circuits, ATM can give customers with virtual circuits th...

ATM can give customers with virtual circuits that seem traditional leased digital circuits. Such permanent virtual circuits (PVC) fixed as the customer pay the periodic fee for its

Explain the authentication header (ah) protocol, Can you explain the Authen...

Can you explain the Authentication Header (AH) Protocol?

What are the access methods used in lan, What are the Access methods used i...

What are the Access methods used in LAN: i. Switched access: It is used in LANs which are assigned around CBXs. Electronic switching is techniques are used to provide access

Describe in detail with example how data fragmentation works, Describe in d...

Describe in detail with example how data fragmentation works?

State some security models, State some Security Models The first and f...

State some Security Models The first and foremost thing one needs to do is to chalk out a security plan and policy based on any security model. The term security policy shall

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd