Friday 28 November 2014

Network Topology

                                   Network topologies

The topology of a network is the logical structure of the connections
in a network. Here are three topologies you might encounter.

Star topology

When we talked about designing and wiring networks, we assumed that
we were working with an Ethernet switch or hub in the middle. The
topology or shape of this network is called a star. A star is called that
because all the network clients talk to the hub or switch in the middle.
 

 

 

 

 

 

 

 

Bus Topology

Another topology is the bus. An Ethernet network using coax uses a
bus topology. All the network nodes are connected to a shared cable,
so there is no central device. Each node on the network deals with
all the traffic.

 

Token Ring Topology

A third topology is the ring. Token Ring is the most widely used ring
technology. It was designed by IBM and is a proprietary technology,
so it wasn’t as widely adopted as Ethernet. Token Ring uses a “token”
packet that is sent from client to client. The client holding the token is
allowed to send network traffic.


Mesh Topology

 A mesh network uses a network topology in which each node (called a mesh node) relays data for the network. All nodes cooperate in the distribution of data in the network.

Designers of mesh networks can employ a flooding technique or a routing technique. When using a routing technique, the message is propagated along a path, by hopping from node to node until the destination is reached. To ensure all its paths' availability, a routing network must allow for continuous connections and reconfiguration around broken or blocked paths, using self-healing algorithms. Self-healing capability enables a routing-based network to operate when one node breaks down or when a connection becomes unreliable. As a result, the network is typically quite reliable, as there is often more than one path between a source and a destination in the network. Although mostly used in wireless situations, this concept can also apply to wired networks and to software interaction.

A mesh network whose nodes are all connected to each other is a fully connected network. Fully connected wired networks have the advantages of security and reliability: problems in a cable affect only the two nodes attached to it. However, in such networks, the number of cables, and therefore the cost, goes up rapidly as the number of nodes increases.


3 comments:

Nikki said...

Are you worried your spouse might be cheating on you ? Do you want to
spy on their chats, calls and text messages ? Do you want to get
notifications on the places they visit ? WISETECHACKER @ GMAIL COM can do all
these and many more, He cloned mobile phones thereby delivering
intercepted messages in real time. Catch them red handed. He can get you
all evidence you need. Write to him through email WISETECHHACKER
Wisetechhacker @ gmail com Reach out to them today for any
solutions and you'll thank me

Anonymous said...

THIS IS A "MUST READ" FOR ALL NFT / CRYPTO CURRENCY SCAM VICTIMS AND EVERYONE BATTLING WITH POOR CREDIT SCORE.

WHAT IS THE TENDENCY OF ACTUALLY GETTING BACK LOST NFT's OR FUNDS LOST TO CRYPTOCURRENCY SCAM? ABSOLUTELY POSSIBLE. DO YOU DESIRE CREDIT REPAIR?(TRANSUNION, EQUIFAX, EXPERIAN)? YOU MUST CONTACT THE RIGHT AGENCY TO ACHIEVE THIS. www recoveryprecinct com

Recovery Precinct is a financial regulator, private investigation and funds recovery body. We specialize in cases concerning ethical hacking, cryptocurrency, FAKE investment schemes and recovery scam. We are also experts in credit repair.

Visit www recoveryprecinct com now and fill the contact form to report your case, our agents will reach out to you within 24hours or contact our support team via the contact information below to get started.

📪 recoveryprecinct @ gmail com

Stay Safe !

Kelly Howard said...

I quite know of a particular cost effective pro hacker who is well know all over the word, and that provide good services when comes to hacking of any such, they are only hacker that i can recommend in this website because have use them couple of time and i will say was awesome. They provide the following service such as school grade, WhatsApp hacking, criminal record, Facebook account, retriever of lost document or lost crypto and more contact them via hackerspytech @ gma1l c0m