wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

profile
Chayan Bhattacharjee
Mar 30, 2017
1 Like
0 Discussions
1656 Reads

'C' of "Networking" (cont...)

III. RING topology: A ring topology is a topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node. A token ring network is a network in which all computers are connected in a ring topology and a bit-passing or token-passing scheme is used in order to prevent the collision of data between two computers that want to send messages at the same time. Token Ring network is ideally used in LAN (Local Area Network).


Ring Topology
Advantages:

--> Data is quickly transferred without a ‘bottle neck’. (very fast, all data traffic is in the same direction)  [Justify: One node is directly connected to only two neighboring nodes and hence it can pass the data directly without bottleneck (choking/blockage of network)]

--> Adding additional nodes has very little impact on bandwidth.  [Justify: Adding one node simply means connecting an external node to two neighboring node and thus it will have minimum impact on bandwidth as it is not passing data, to any other node in the network, directly]


Disadvantages:

--> If any of the nodes fail then the ring is broken and data cannot be transmitted successfully.  [Justify: Just like a necklace of pearl, if one pearl breaks out, the whole necklace breaks. same logic can be applied in this topology.]

--> It is difficult to troubleshoot the ring.  [Justify: All the nodes are only connected to 2 nodes only and there is no single point of reporting like in star topology and hence it becomes difficult to identify which node is defective and thus hard to troubleshoot, similar to bus topology.]



IV. TREE topology: A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star-configured workstations connected to a linear bus backbone cable. Thus, a tree network is a bus network of star networks.


Tree Toplogy   Advantages:

--> Expansion of Network is possible and easy.  [Justify: Adding of system in bus topology is easier as the connection is only to be made to the backbone cable, similarly in tree topology, a complete star topology would be treated as a node and is added on the backbone and thus expansion is not complicated.]

--> Each segment is provided with dedicated P2P wiring to the central hub. Thus no Central point of failure.  [Justify: Unlike Bus topology which had T-CONNECTOR for connection of every node, a hub or an advanced sort of connector is used in tree topology. This connector gives a Point to Point (P2P) connection for all the star topologies (referred to as 'segments') with the backbone cable.]


Disadvantages:

--> As more and more nodes and segments are added, the maintenance becomes difficult.  [Justify: Similar to bus topology, for heavy traffic, single backbone line does not provide efficiency in network]

--> Scalability of the network depends on the type of cable used.  [Justify: The backbone cable type plays a major role as the medium must not get damaged due to heavy load of data.]



V. MESH topology: A mesh network is a network topology in which each node relays data for the network. All mesh nodes cooperate in the distribution of data in the network. In a full mesh topology, each network node (workstation or other device) is connected directly to each of the others. In a partial mesh topology, some nodes are connected to all the others, but others are only connected to those nodes with which they exchange the most data.


Partial & Full Mesh Topology
Advantages:

--> Data can be transmitted from different devices simultaneously. This topology can withstand high traffic.  [Justify: All the nodes are connected to either every other node or to the node with most exchange of data and thus high traffic of data will not create congestion in the network as there are multiple paths for connection.]

--> Expansion and modification in topology can be done without disrupting other nodes.  [Justify: Similar to ring topology where addition of one node would mean that it must be connected to two nodes while in Mesh, one node must be added to all the other nodes or some of the nodes depending upon partial or full mesh configuration. Thus adding a node is not problematic but creating this whole setup is tedious.]


Disadvantages:

--> There are high chances of redundancy in many of the network connections.  [Justify: All the nodes are directly connected and hence there may be repetition of data.]

--> Set-up and maintenance of this topology is very difficult. Even administration of the network is tough.  [Justify: Every node is connected to every other node and this setup is very difficult to form and maintain and it also makes it difficult to identify that which node is exactly creating faults and specifically which part of data is at fault.]

 

***Thus answering all the basic rhetorical questions such as "What", "Why" (A-B-C of Networking: Part-1) and "How" (A-B-C of Networking: Part-2, A-B-C of Networking: Part-3A and A-B-C of Networking: Part-3B)  of networking in 4 blogs.***


Comments ()


Sign in

Read Next

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

"Games and the future"

Blog banner

Virtual Memory

Blog banner

Models of Information Security.

Blog banner

Lucidchart

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

Security and E-mail

Blog banner

What is online marketing and why do you need to know about it ?

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

Secure Hypertext transfer protocol

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

Importance of Website

Blog banner

Os Virtual Memory

Blog banner

APACHE KAFKA

Blog banner

The Laws of Karma

Blog banner

Student Grade Calculator in LISP

Blog banner

security requirements for safe e-payment

Blog banner

MACHINE LEARNING

Blog banner

Disk Scheduling

Blog banner

Deadlock and Starvation

Blog banner

Decision Tree: A Diagram Model

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

A little bit of salt is all the hash needs!

Blog banner

The Evolution of Operating Systems

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Virtual Memory

Blog banner

Network Footprinting in Cybersecurity

Blog banner

Deadlock and starvation

Blog banner

Virtual Machine's

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

Dudhasagar waterfall ?

Blog banner

Memory Management

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

CONCURRENCY

Blog banner

Study of Sniffing Tools

Blog banner

Teenagers of Today

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

Atlantis - The Lost Island.........

Blog banner

What are Tenders its various types

Blog banner