Topologies in computer network, Computer Networking

Assignment Help:

Topologies in computer network?


Related Discussions:- Topologies in computer network

Explain the routing table of solaris system, Question 1 Write a note on a)...

Question 1 Write a note on a) Internet layer b) strict source routing Question 2 Explain the routing table of Solaris system Question 3 Explain following concepts a) MIM

Circuit switched and packet-switched mode for sending a file, Two hosts are...

Two hosts are connected by a path made of four links as shown in the figure below. The links are of data rate R = 2 Mbps each. Host A has a file of size F = 1,000,000 bytes to tran

Shortest path - network layer and routing , Shortest path  The  dijkst...

Shortest path  The  dijkstra algorithms  four steps to discover what it called  the shortest path  tree . a.The algorithm  beings  to build  the tree identifying  its root.

Fiber modems, FIBER MODEMS: LAN methods are discovered to perform with...

FIBER MODEMS: LAN methods are discovered to perform within the same building. However most institutions have offices located far apart from one other. DISTANCE LIMITATION A

netware protocol works on layer 3, Which NetWare protocol works on layer 3...

Which NetWare protocol works on layer 3--network layer-of the OSI model? Ans)IPX

State the uses of groupware, State the uses of groupware With the use o...

State the uses of groupware With the use of groupware, users can easily do most of the office related management work, which otherwise would be extremely difficult. For instanc

Banking industry, Will like to know what is the standard industrial practic...

Will like to know what is the standard industrial practice for a bank network design? Preferably with complete paper on the network design covering security, domain segregation, vi

What is source route and ospf, What is source route and OSPF? Source r...

What is source route and OSPF? Source route It is a series of IP addresses identifying the route a datagram must follow. A source route might optionally be included in an

What is structured query langauge (sql), SQL is a powerful set-oriented lan...

SQL is a powerful set-oriented language which was developed by IBM research for the databases that adhere to the relational model. It having of a short list of powerful, yet highly

Multiple activity charts, A multiple activity chart records the related ...

A multiple activity chart records the related sequence of activities of more than one subject, men and / or machine on a common time scale showing the relationship between

12/5/2013 5:13:10 AM

Star Topology:

In star topology all the nodes are coupled to a central node called a hub. A node that requirements to send some six data to some other node on the network send data to a hub which in turn sends it the destination node. A hub plays a key role in such networks. Star topology is easy to set up and reconfigure. If a link fails then it divides the node connected to link from the network and the network continues to function. However, if the hub goes down, the entire system collapses.

Tree Topology:
Tree topology is a pecking order of a variety of hubs. The entire nodes are related to one hub or the other. There is a middle hub to which only a few nodes are connected directly. The inner hub, also called lively hub, appear at the inward bits and regenerates them so that they can pass through in excess of longer spaces. The secondary hubs in tree topology may be active hubs or passive hubs. The failure of a conduction line separates a node from the system.

Mesh Topology:
A mesh topology is also explains complete topology. In this topology, each node is associated directly to every oilier node in the network. That is as such there are n nodes then there would be n (n - 1)/2 physical links in the network. As there are dedicated links, the topology does not have blocking problems. Further it does not have to a special Media Access Control (MAC) protocol to prevent simultaneous access to the communication media since links are devoted, not collective. The topology also provides data security. The network can continue to function even in the failure of one of the links. Error identification is also easy. The main drawback of mesh topology is the complication of the complex and the price associated with the cable length. The mesh topology is not useful for intermediate to large systems.


Hybrid Topology:
Hybrid topology is shaped by linking two or additional topologies together. As in hybrid topology can be produced by returns of the bus, star and ring topologies

 

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd