Topologies in computer network, Computer Networking

Assignment Help:

Topologies in computer network?


Related Discussions:- Topologies in computer network

Explain different protocols of internet, WEB TECHNOLOGY 1. Explain diff...

WEB TECHNOLOGY 1. Explain different protocols of internet. 2. Differentiate between DHTML and HTML. 3. What do you understand by Event-driven Programming? Classify differ

Two items that tcp and udp share in common, Recognize the two items that TC...

Recognize the two items that TCP and UDP share in common? Ans) TCP and UPD are both layer 4 Transport protocols and both use port number to recognize upper level applications.

What is subnetting, Q. What is Subnetting ? Subnetting IP add...

Q. What is Subnetting ? Subnetting IP addressing is hierarchical First reach a device through its network id (netid) Then reach the host itself using the se

What is domains in active directory, In Windows 2000, a domain describes bo...

In Windows 2000, a domain describes both an administrative boundary and a security boundary for a collection of objects that are relevant to a particular group of users on a networ

Internet mail access protocol - application layer, Internet  Mail Access P...

Internet  Mail Access Protocol Another  mail access  protocols  is internet  mail access  protocols  version 4 (  IMAP4). IMAP4 is  similar to POP3 but it  has more  feature

Use of a distance vector routing algorithm, Question: (a) The diagram ...

Question: (a) The diagram below shows a configuration of Internet routers (A-F) which achieve dynamic routing through the use of a Distance Vector routing algorithm. The metr

What is OSPF, What is OSPF? It is an Internet routing protocol that scal...

What is OSPF? It is an Internet routing protocol that scales well, can route traffic with multiple paths, and uses knowledge of an Internet's topology to make precise routing de

Why it is necessary to have layering in a network, Why it is necessary to h...

Why it is necessary to have layering in a network? A computer network is a very complex system. It becomes very difficult to execute as a single entity. The layered approach di

Uses of fragmentation and reassembly, Uses of fragmentation and reassembly ...

Uses of fragmentation and reassembly The More bit is used for fragmentation and reassembly. If this bit is 0, then either there has been no fragmentation of this packet or this

What is a vlan, VLAN - Virtual Local Area Network Vlan is a logical grou...

VLAN - Virtual Local Area Network Vlan is a logical grouping or segmenting a network linked to administratively described ports on a switch, they give Broadcast control, Securit

12/5/2013 5:13:10 AM

Star Topology:

In star topology all the nodes are coupled to a central node called a hub. A node that requirements to send some six data to some other node on the network send data to a hub which in turn sends it the destination node. A hub plays a key role in such networks. Star topology is easy to set up and reconfigure. If a link fails then it divides the node connected to link from the network and the network continues to function. However, if the hub goes down, the entire system collapses.

Tree Topology:
Tree topology is a pecking order of a variety of hubs. The entire nodes are related to one hub or the other. There is a middle hub to which only a few nodes are connected directly. The inner hub, also called lively hub, appear at the inward bits and regenerates them so that they can pass through in excess of longer spaces. The secondary hubs in tree topology may be active hubs or passive hubs. The failure of a conduction line separates a node from the system.

Mesh Topology:
A mesh topology is also explains complete topology. In this topology, each node is associated directly to every oilier node in the network. That is as such there are n nodes then there would be n (n - 1)/2 physical links in the network. As there are dedicated links, the topology does not have blocking problems. Further it does not have to a special Media Access Control (MAC) protocol to prevent simultaneous access to the communication media since links are devoted, not collective. The topology also provides data security. The network can continue to function even in the failure of one of the links. Error identification is also easy. The main drawback of mesh topology is the complication of the complex and the price associated with the cable length. The mesh topology is not useful for intermediate to large systems.


Hybrid Topology:
Hybrid topology is shaped by linking two or additional topologies together. As in hybrid topology can be produced by returns of the bus, star and ring topologies

 

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd