Topologies in computer network, Computer Networking

Assignment Help:

Topologies in computer network?


Related Discussions:- Topologies in computer network

One characteristic of rarp?, Reverse Address Resolution Protocol is used to...

Reverse Address Resolution Protocol is used to get a layer 3 address if the MAC address is called which then facilitates the loading of the O/S.

Explain routing loop issue in rip protoco, Can you determine routing loop i...

Can you determine routing loop issue in RIP protocol?

Give the structure of an atm uni cell header, a) Consider a hypothetical a...

a) Consider a hypothetical arrangement of ‘self-learning' bridges shown in the figure below. Assuming all are initially empty, give the forwarding tables for each of the bridges B

What is the difference between csma/cd and csma/ca, What is the difference ...

What is the difference between CSMA/CD and CSMA/CA? CSMA/CD, or Collision Detect, retransmits data frames when a collision occurred. CSMA/CA, or Collision Avoidance, will first

Determine about the internet, Determine about the Internet The I...

Determine about the Internet The Internet as a source of information and reference material, browsing the World Wide Web (WWW) and Newsgroups for the latest gossip or sh

Hierarchical routing strategy, i want a program of hierarchical programming...

i want a program of hierarchical programming in c language with its output. please help me .

What is the effect on the security of the password, Question: (a) What...

Question: (a) What is a script kiddie? Is it a significant security threat, and why? (b) Assume that UNIX uses the user login name in lieu of the traditional salt, what is

Illustrate the model for network security, Q. Illustrate the Model for Netw...

Q. Illustrate the Model for Network Security? - A message is transferred from one party (Principal) to another. - A logical information channel is founded between the t

Explain the architecture and usage of isdn, Computer Networks 1. Write ...

Computer Networks 1. Write about different network structures in use. 2. Explain the architecture and usage of ISDN. 3. Describe the concept of framing in Data Link Layer

What do mean by tunnel mode, What do mean by tunnel mode? This is a mod...

What do mean by tunnel mode? This is a mode of data exchange wherein two communicating computers do not use IPSec themselves. Instead, the gateway that is linking their LANs to

12/5/2013 5:13:10 AM

Star Topology:

In star topology all the nodes are coupled to a central node called a hub. A node that requirements to send some six data to some other node on the network send data to a hub which in turn sends it the destination node. A hub plays a key role in such networks. Star topology is easy to set up and reconfigure. If a link fails then it divides the node connected to link from the network and the network continues to function. However, if the hub goes down, the entire system collapses.

Tree Topology:
Tree topology is a pecking order of a variety of hubs. The entire nodes are related to one hub or the other. There is a middle hub to which only a few nodes are connected directly. The inner hub, also called lively hub, appear at the inward bits and regenerates them so that they can pass through in excess of longer spaces. The secondary hubs in tree topology may be active hubs or passive hubs. The failure of a conduction line separates a node from the system.

Mesh Topology:
A mesh topology is also explains complete topology. In this topology, each node is associated directly to every oilier node in the network. That is as such there are n nodes then there would be n (n - 1)/2 physical links in the network. As there are dedicated links, the topology does not have blocking problems. Further it does not have to a special Media Access Control (MAC) protocol to prevent simultaneous access to the communication media since links are devoted, not collective. The topology also provides data security. The network can continue to function even in the failure of one of the links. Error identification is also easy. The main drawback of mesh topology is the complication of the complex and the price associated with the cable length. The mesh topology is not useful for intermediate to large systems.


Hybrid Topology:
Hybrid topology is shaped by linking two or additional topologies together. As in hybrid topology can be produced by returns of the bus, star and ring topologies

 

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd