Topologies in computer network, Computer Networking

Assignment Help:

Topologies in computer network?


Related Discussions:- Topologies in computer network

Types of ends in wan, There are two types of ends in WAN (1)DTE (DATA TE...

There are two types of ends in WAN (1)DTE (DATA TERMINAL EQUIPMENT) (2)DCE(DATA COMMUNICATION EQUIPMENT)

the default settings of ipx delay number, The "ipx delay number" command w...

The "ipx delay number" command will permit an administrator to alter the default settings. Explain the default settings? Ans) For LAN interfaces, one tick; for WAN interfaces, s

Applications of networks, Q. Applications of networks? End systems (h...

Q. Applications of networks? End systems (hosts): - Run application programs - Example email, Web - At -edge of network Client/server model - Client host

UDP Programming, I have a larget text file of 1MB, how do i break down into...

I have a larget text file of 1MB, how do i break down into chunks of packets to send over UDP? byte b[]=new byte[1024]; FileInputStream f=new FileInputStream("input.txt

How to connect remote lans, Q. How to connect Remote LANs? - Remote br...

Q. How to connect Remote LANs? - Remote bridges acting as connecting devices to connect LANs and point-to-point networks such as leased telephone lines or ADSL lines

Building a defense in networking, Q. Building a Defense in networking? ...

Q. Building a Defense in networking? When building a defense you must use a layered approach that includes securing - The network infrastructure the communications protocol

What are the local network security issues, Q. What are the Local Network S...

Q. What are the Local Network Security Issues? Local Network Security Issues Password Protection - Encrypted username & password Group/Owner ID's - File Permissi

Compare udp and tcp, QUESTION a) National regulations require the avail...

QUESTION a) National regulations require the availability of the following services for all IP to PSTN, PSTN to IP, and IP to IP calls. Name any three types of these features

Define the term network throughput, Network throughput It is a symptoma...

Network throughput It is a symptomatic measure of the message carrying capability of a network. It is termed as the total number of messages network can send in per unit time.

Discuss your strategy to test wlpc system, Wireless Phone Company (WLPC) is...

Wireless Phone Company (WLPC) is a provider of wireless phone service in the US with 100,000 customers serving mostly small markets. WLPC has just purchased additional airwaves in

12/5/2013 5:13:10 AM

Star Topology:

In star topology all the nodes are coupled to a central node called a hub. A node that requirements to send some six data to some other node on the network send data to a hub which in turn sends it the destination node. A hub plays a key role in such networks. Star topology is easy to set up and reconfigure. If a link fails then it divides the node connected to link from the network and the network continues to function. However, if the hub goes down, the entire system collapses.

Tree Topology:
Tree topology is a pecking order of a variety of hubs. The entire nodes are related to one hub or the other. There is a middle hub to which only a few nodes are connected directly. The inner hub, also called lively hub, appear at the inward bits and regenerates them so that they can pass through in excess of longer spaces. The secondary hubs in tree topology may be active hubs or passive hubs. The failure of a conduction line separates a node from the system.

Mesh Topology:
A mesh topology is also explains complete topology. In this topology, each node is associated directly to every oilier node in the network. That is as such there are n nodes then there would be n (n - 1)/2 physical links in the network. As there are dedicated links, the topology does not have blocking problems. Further it does not have to a special Media Access Control (MAC) protocol to prevent simultaneous access to the communication media since links are devoted, not collective. The topology also provides data security. The network can continue to function even in the failure of one of the links. Error identification is also easy. The main drawback of mesh topology is the complication of the complex and the price associated with the cable length. The mesh topology is not useful for intermediate to large systems.


Hybrid Topology:
Hybrid topology is shaped by linking two or additional topologies together. As in hybrid topology can be produced by returns of the bus, star and ring topologies

 

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd