Topologies in computer network, Computer Networking

Assignment Help:

Topologies in computer network?


Related Discussions:- Topologies in computer network

What to do to connection with external communication, What to do to connect...

What to do to connection with external communication For dealing with external communication, the Web server must have a static IP. Having a static IP could also be a problemat

Working of internet, As discussed in the earlier section each computer link...

As discussed in the earlier section each computer linked to the Internet has a unique address. Let's assume your IP address is 1.2.3.4 & you wish to send a message to the computer

Computing shortest path in a graph, While calculating shortest path, first ...

While calculating shortest path, first we assume graph presentation of network at every node then we use Djikstra's algorithm to calculate shortest path from every node to other on

osi layer performs code conversion, Name the OSI layer which performs code...

Name the OSI layer which performs code conversion, code formatting and encryption Ans) Presentation layer performs code conversion, code formatting and encryption

Internet infrastructure, Thus now you know how packets travel from one comp...

Thus now you know how packets travel from one computer to another computer over the Internet. however what's in-between? What in fact makes up the Internet infrastructure or backbo

Compare delays in packet switching and circuit switching, In this question,...

In this question, you will compare delays in packet switching (i.e. in IP networks), in circuit switching (i.e. in PSTN telephony) and in virtual circuit packet switching (i.e. in

How to prevent the data from hackers, How to prevent the data from hackers ...

How to prevent the data from hackers In order to prevent intruders from entering the house, it is necessary for the house owner to look after the behaviour of internal and exte

Show the go-back- N - control variables, Q. Show the Go-back-N - Control Va...

Q. Show the Go-back-N - Control Variables? - S- holds the series number of the recently sent frame - SF - holds sequence number of the first frame in the window - SL - ho

Explain peer-to-peer networking model, Explain Peer-to-Peer Networking Mode...

Explain Peer-to-Peer Networking Model. A networking model where every workstation has equivalent capabilities and responsibilities is called as peer-to-peer model. There is no

12/5/2013 5:13:10 AM

Star Topology:

In star topology all the nodes are coupled to a central node called a hub. A node that requirements to send some six data to some other node on the network send data to a hub which in turn sends it the destination node. A hub plays a key role in such networks. Star topology is easy to set up and reconfigure. If a link fails then it divides the node connected to link from the network and the network continues to function. However, if the hub goes down, the entire system collapses.

Tree Topology:
Tree topology is a pecking order of a variety of hubs. The entire nodes are related to one hub or the other. There is a middle hub to which only a few nodes are connected directly. The inner hub, also called lively hub, appear at the inward bits and regenerates them so that they can pass through in excess of longer spaces. The secondary hubs in tree topology may be active hubs or passive hubs. The failure of a conduction line separates a node from the system.

Mesh Topology:
A mesh topology is also explains complete topology. In this topology, each node is associated directly to every oilier node in the network. That is as such there are n nodes then there would be n (n - 1)/2 physical links in the network. As there are dedicated links, the topology does not have blocking problems. Further it does not have to a special Media Access Control (MAC) protocol to prevent simultaneous access to the communication media since links are devoted, not collective. The topology also provides data security. The network can continue to function even in the failure of one of the links. Error identification is also easy. The main drawback of mesh topology is the complication of the complex and the price associated with the cable length. The mesh topology is not useful for intermediate to large systems.


Hybrid Topology:
Hybrid topology is shaped by linking two or additional topologies together. As in hybrid topology can be produced by returns of the bus, star and ring topologies

 

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd