Explain topology method used in lan technology in detail, Computer Engineering

Assignment Help:

Explain topology method used in LAN technology in detail.

LAN Topologies: Network topology is a physical schematic that shows interconnection of the various users. There are four fundamental topologies as follows:

(i) Direct Connection or one to all topology

(ii) Star topology

(iii) Bus Topology

(iv) Ring topology

(i) Direct connection or one to one topology: In this topology, there is a path among every node and each other node. The number of paths needed is defined by the equation P = (n2-n)/2, here n is number of nodes and P is here total number of paths. Therefore number of paths rises considerably as the number of nodes raises. Each node should be physically capable to connect to paths to every other node therefore a very large connector and connected interface support circuitry is required at each node. Adding a new node needs main rewiring and affects the software which manages communications for the system.

(ii) Star Topology: In this topology, all user nodes are associated to central node point which interconnects all the individual user nodes and links. Data flows from one node, by the star centre to the needed receiving node. The Central node is as a large switch that routes the data from the input line to the output line. Advanced central nodes can contain multiple switching paths; therefore several paths exist at similar time. This topology is utilized in a telephone system central office. In addition of a new user node needs running only a single link from the star centre to the user without disturbing any other node.

(iii)Bus Topology: The Bus topology shares a single link or path way in between all users. This common single path way is termed as bus. In Bus topology, the link serves as a high way for all data signals, and users connect upon to the bus at their node location. In the bus configurations, network control is not centralized to a specific node. Now control is distributed between all nodes associated to the LAN. Data transmission on a bus network is generally in the form of small packets having user addresses and data. While one node/user needs to transmit data to other station, this monitors the bus to find out if it is currently being used. When no other nodes/users are communicating over the network, the monitoring node/user can begin to transmit its data. Each node should monitor all transmission on the network and find out that are intended for them.

(iv) Ring Topology: In this topology, all user nodes are associated with the physical path acting as links of a chain and the last user node is associated back to the first node. A signal going on to the next node should be processed by the first node that then passes this through to the next node. By adding a new user needs breaking the ring temporarily, inserting the new node and then re-establishing the total ring path.

1326_Networks Topologies.png

FIG - Networks Topologies


Related Discussions:- Explain topology method used in lan technology in detail

Implement or, Q. Write a program to implement OR, NOR, AND and NAND gates ...

Q. Write a program to implement OR, NOR, AND and NAND gates using and without using Bit wise operator. The menu should be as follows: I. Using Bit Wise operator II. Withou

Explain public key encryption, Public Key Encryption A cryptographic sy...

Public Key Encryption A cryptographic system that uses two-keys-a public  key known to everyone and a private or secret key known only to the recipient of the message. An si

Credit line, The Credit Line The Credit Line is a set of informational f...

The Credit Line The Credit Line is a set of informational facts usually found below or beside a picture of a work of art. Should the picture appear in a book, magazine, poster,

Pci bus transactions - computer architecture, PCI bus transactions: PC...

PCI bus transactions: PCI bus traffic is prepared of a series of PCI bus transactions. Each transaction is build up of an address phase that is followed by 1 or more data phas

Convert the decimal number to excess-3 code, Convert the decimal number 430...

Convert the decimal number 430 to Excess-3 code ? Ans. Excess  3  is  a  digital  code  acquired  from  adding  3  to  every  decimal  digit  and  after that converting the res

Weight training calculations, Weight Training Calculations: However we...

Weight Training Calculations: However we have more weights in our network than in perceptrons but we firstly need to introduce the notation as: w ij just to specify the weigh

Target _self, TARGET = "_self" "_self" puts the new document in the s...

TARGET = "_self" "_self" puts the new document in the same window and frame as current document. "_self" works the same as if you hadn't used TARGET at all.

Interaction design and human–computer interaction, You should now have a re...

You should now have a reasonably clear understanding of what is meant by interaction design. However, there are several other terms which are often used to refer to particular aspe

Concept of multithreading, Concept of Multithreading: These troubles incre...

Concept of Multithreading: These troubles increase in the design of large-scale multiprocessors such as MPP as discussed above. Thus, a solution for optimizing this latency should

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd