wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Mesh Topology

profile
Anjali Gupta
Aug 29, 2022
0 Likes
0 Discussions
143 Reads

In this layout, every system is connected to every other system. The main advantage of this topology is high availability. The main disadvantage of this topology is cost, both administrative and physical. Because each system is connected to each other, the amount of cabling and maintenance necessary can be prohibitive, especially in larger networks.

This topology is mainly used in Wide Area Network environments or in environments where high availability outweighs the costs associated with this amount of interconnection.A wireless mesh network is made up of three or more wireless access points, working in harmony with each other while sharing each other routing protocols, in a collection of cross-connect links to create an interconnected electronic pathway for the transmission between two or more computers. When a wireless mesh is form it creates a single name identifier for access and the signals between wireless access points are used with each other to clearly distinguishable from another network. The organization of sharing access points working in harmony is known as the mesh topology. The defined mesh topology of a given area defined by the access points is known as mesh cloud. Access to this mesh cloud is dependent on the network created by the access points.


Comments ()


Sign in

Read Next

GIS Bharat Maps

Blog banner

internet email and it's applications

Blog banner

Types of Big Data

Blog banner

OLA

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

MENDELEY

Blog banner

Metasploit

Blog banner

Functions Of Operating Systems

Blog banner

Virtual memory

Blog banner

Precision-Recall in Data Science

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

Paginng In OS

Blog banner

Penetration Testing

Blog banner

E-Cash (Electronic Cash)

Blog banner

Memory Management

Blog banner

Technical SEO : Total Guide

Blog banner

Have You Explored India Yet?

Blog banner

Music helps reduce stress

Blog banner

Shoulders

Blog banner

Cache Memory

Blog banner

Information Technology In E- Commerce

Blog banner

MAILFENCE

Blog banner

USES OF WHATSAPP

Blog banner

Firewall in Computer Network

Blog banner

10 Problems you face if you are an Otaku

Blog banner

Data Exfiltration

Blog banner

Process states

Blog banner

Deadlock

Blog banner

BITCOIN WALLET

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

E-learning in today's world

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Uniprocessor Scheduling

Blog banner

EID UL FITR

Blog banner

Virtual Memory

Blog banner

Constrains in service design

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

FAMILY WHERE LIFE BEGINS....

Blog banner

Processes : Process description and control

Blog banner