wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

profile
Chayan Bhattacharjee
Mar 30, 2017
1 Like
0 Discussions
1656 Reads

'C' of "Networking" (cont...)

III. RING topology: A ring topology is a topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node. A token ring network is a network in which all computers are connected in a ring topology and a bit-passing or token-passing scheme is used in order to prevent the collision of data between two computers that want to send messages at the same time. Token Ring network is ideally used in LAN (Local Area Network).


Ring Topology
Advantages:

--> Data is quickly transferred without a ‘bottle neck’. (very fast, all data traffic is in the same direction)  [Justify: One node is directly connected to only two neighboring nodes and hence it can pass the data directly without bottleneck (choking/blockage of network)]

--> Adding additional nodes has very little impact on bandwidth.  [Justify: Adding one node simply means connecting an external node to two neighboring node and thus it will have minimum impact on bandwidth as it is not passing data, to any other node in the network, directly]


Disadvantages:

--> If any of the nodes fail then the ring is broken and data cannot be transmitted successfully.  [Justify: Just like a necklace of pearl, if one pearl breaks out, the whole necklace breaks. same logic can be applied in this topology.]

--> It is difficult to troubleshoot the ring.  [Justify: All the nodes are only connected to 2 nodes only and there is no single point of reporting like in star topology and hence it becomes difficult to identify which node is defective and thus hard to troubleshoot, similar to bus topology.]



IV. TREE topology: A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star-configured workstations connected to a linear bus backbone cable. Thus, a tree network is a bus network of star networks.


Tree Toplogy   Advantages:

--> Expansion of Network is possible and easy.  [Justify: Adding of system in bus topology is easier as the connection is only to be made to the backbone cable, similarly in tree topology, a complete star topology would be treated as a node and is added on the backbone and thus expansion is not complicated.]

--> Each segment is provided with dedicated P2P wiring to the central hub. Thus no Central point of failure.  [Justify: Unlike Bus topology which had T-CONNECTOR for connection of every node, a hub or an advanced sort of connector is used in tree topology. This connector gives a Point to Point (P2P) connection for all the star topologies (referred to as 'segments') with the backbone cable.]


Disadvantages:

--> As more and more nodes and segments are added, the maintenance becomes difficult.  [Justify: Similar to bus topology, for heavy traffic, single backbone line does not provide efficiency in network]

--> Scalability of the network depends on the type of cable used.  [Justify: The backbone cable type plays a major role as the medium must not get damaged due to heavy load of data.]



V. MESH topology: A mesh network is a network topology in which each node relays data for the network. All mesh nodes cooperate in the distribution of data in the network. In a full mesh topology, each network node (workstation or other device) is connected directly to each of the others. In a partial mesh topology, some nodes are connected to all the others, but others are only connected to those nodes with which they exchange the most data.


Partial & Full Mesh Topology
Advantages:

--> Data can be transmitted from different devices simultaneously. This topology can withstand high traffic.  [Justify: All the nodes are connected to either every other node or to the node with most exchange of data and thus high traffic of data will not create congestion in the network as there are multiple paths for connection.]

--> Expansion and modification in topology can be done without disrupting other nodes.  [Justify: Similar to ring topology where addition of one node would mean that it must be connected to two nodes while in Mesh, one node must be added to all the other nodes or some of the nodes depending upon partial or full mesh configuration. Thus adding a node is not problematic but creating this whole setup is tedious.]


Disadvantages:

--> There are high chances of redundancy in many of the network connections.  [Justify: All the nodes are directly connected and hence there may be repetition of data.]

--> Set-up and maintenance of this topology is very difficult. Even administration of the network is tough.  [Justify: Every node is connected to every other node and this setup is very difficult to form and maintain and it also makes it difficult to identify that which node is exactly creating faults and specifically which part of data is at fault.]

 

***Thus answering all the basic rhetorical questions such as "What", "Why" (A-B-C of Networking: Part-1) and "How" (A-B-C of Networking: Part-2, A-B-C of Networking: Part-3A and A-B-C of Networking: Part-3B)  of networking in 4 blogs.***


Comments ()


Sign in

Read Next

Indian Food

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

Starvation

Blog banner

Quality check in IT services

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

Famous Indian dishes that where misunderstood to be Indian

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

ACHIEVEMENTS IN OPERATING SYSTEMS

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

security requirements for safe e-payment

Blog banner

MySQL

Blog banner

Memory Management

Blog banner

Oracle Corporation

Blog banner

Outlook.com

Blog banner

Deadlock and Starvation

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

SNAPCHAT

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

Zero-Day Attack

Blog banner

10 Unknown facts about India's Independence

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

Wrike

Blog banner

MYNTRA

Blog banner

Modern Operating System

Blog banner

Emailing the merger document

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

Cache memory

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner

gis substation

Blog banner

Security in Operating Systems

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Data Security must be your Priority!

Blog banner

Every body is beautiful

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

SQL Injection

Blog banner

Introduction to Solidity Programming for Blockchain Development

Blog banner

Data Warehousing

Blog banner

Women Empowerment

Blog banner

Memory Management

Blog banner