Explain topology method used in lan technology in detail, Computer Engineering

Assignment Help:

Explain topology method used in LAN technology in detail.

LAN Topologies: Network topology is a physical schematic that shows interconnection of the various users. There are four fundamental topologies as follows:

(i) Direct Connection or one to all topology

(ii) Star topology

(iii) Bus Topology

(iv) Ring topology

(i) Direct connection or one to one topology: In this topology, there is a path among every node and each other node. The number of paths needed is defined by the equation P = (n2-n)/2, here n is number of nodes and P is here total number of paths. Therefore number of paths rises considerably as the number of nodes raises. Each node should be physically capable to connect to paths to every other node therefore a very large connector and connected interface support circuitry is required at each node. Adding a new node needs main rewiring and affects the software which manages communications for the system.

(ii) Star Topology: In this topology, all user nodes are associated to central node point which interconnects all the individual user nodes and links. Data flows from one node, by the star centre to the needed receiving node. The Central node is as a large switch that routes the data from the input line to the output line. Advanced central nodes can contain multiple switching paths; therefore several paths exist at similar time. This topology is utilized in a telephone system central office. In addition of a new user node needs running only a single link from the star centre to the user without disturbing any other node.

(iii)Bus Topology: The Bus topology shares a single link or path way in between all users. This common single path way is termed as bus. In Bus topology, the link serves as a high way for all data signals, and users connect upon to the bus at their node location. In the bus configurations, network control is not centralized to a specific node. Now control is distributed between all nodes associated to the LAN. Data transmission on a bus network is generally in the form of small packets having user addresses and data. While one node/user needs to transmit data to other station, this monitors the bus to find out if it is currently being used. When no other nodes/users are communicating over the network, the monitoring node/user can begin to transmit its data. Each node should monitor all transmission on the network and find out that are intended for them.

(iv) Ring Topology: In this topology, all user nodes are associated with the physical path acting as links of a chain and the last user node is associated back to the first node. A signal going on to the next node should be processed by the first node that then passes this through to the next node. By adding a new user needs breaking the ring temporarily, inserting the new node and then re-establishing the total ring path.

1326_Networks Topologies.png

FIG - Networks Topologies


Related Discussions:- Explain topology method used in lan technology in detail

What do you mean by analysis and design, Analysis: Basically, it is the...

Analysis: Basically, it is the process of determining what requirement to be done before how it should be done. In order to accomplish this, the developer shows the existing sy

Describe the external users of system, Q. Describe the External Users of sy...

Q. Describe the External Users of system? External Users: Modern information systems are now reaching beyond the boundaries of traditional business to involve customers and o

With what symbolic names can be associated, Symbolic names can be associate...

Symbolic names can be associated with? Ans. With data or instruction symbolic names associated.

How can arithmetic processor be associated to the CPU, Q. How can this arit...

Q. How can this arithmetic processor be associated to the CPU?  Two mechanisms are used for connecting arithmetic processor to CPU.   If an arithmetic processor is treated a

Display data in the combo box, Which property on a Combo Box do you set wit...

Which property on a Combo Box do you set with a column name, prior to setting the Data Source, to display data in the combo box? ComboBox.DataValueField = "ColumnName" When

Analysis of amdahls law, The outcomes of analysis of Amdahl's law are: 1...

The outcomes of analysis of Amdahl's law are: 1) To optimize the performance of parallel computers, modified compilers need to be developed which should aim to decrease the numb

What is the meaning of aliasing, a. What is the meaning of aliasing? What a...

a. What is the meaning of aliasing? What are its drawbacks? Describe a method to remove aliasing, using post filtering. b. How can you copy a Pixmap from one place to another

Unix essentials, Version Control is a critical tool in development and prod...

Version Control is a critical tool in development and production environments that allows a user to make snapshots of working con?gurations or code. In this assignment, you will de

Define seek time and latency time, Define seek time and latency time. ...

Define seek time and latency time.  The time taken by the head to move to the appropriate cylinder or track is known as seek time. Once the head is at right track, it must wai

Show the hypothetical instruction format of 32 bits, Q. Show the Hypothetic...

Q. Show the Hypothetical Instruction Format of 32 bits? A sample instruction format is shown in figure below. Figure: A Hypothetical Instruction Format of 32 bits

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd