Topology
Topology
Topology
Mesh Topology:
• Suppose the N number of devices are connected with each other in a mesh
topology, the total number of ports that are required by each device is N-1.
In Figure 1, there are 5 devices connected to each other, hence the total
number of ports required by each device is 4. The total number of ports
required=N*(N-1).
• Suppose, N number of devices are connected with each other in a mesh
topology, then the total number of dedicated links required to connect them
is NC2 i.e. N(N-1)/2. In Figure 1, there are 5 devices connected to each other,
hence the total number of links required is 5*4/2 = 10.
Star Topology:
In star topology, all the devices are connected to a single hub through a cable. This
hub is the central node and all other nodes are connected to the central node. The
hub can be passive in nature i.e., not an intelligent hub such as broadcasting
devices, at the same time the hub can be intelligent known as an active hub. Active
hubs have repeaters in them. Coaxial cables or RJ-45 cables are used to connect the
computers. In Star Topology, many popular Ethernet LAN protocols are used as
CD(Collision Detection), CSMA (Carrier Sense Multiple Access), etc.
• If N devices are connected to each other in a star topology, then the number
of cables required to connect them is N. So, it is easy to set up.
• Each device requires only 1 port i.e. to connect to the hub, therefore the total
number of ports required is N.
• It is Robust. If one link fails only that link will affect and not other than that.
• Easy to fault identification and fault isolation.
• Star topology is cost-effective as it uses inexpensive coaxial cable.
Problems with this topology:
• If the concentrator (hub) on which the whole topology relies fails, the whole
system will crash down.
• The cost of installation is high.
• Performance is based on the single concentrator i.e. hub.
Bus Topology:
Bus topology is a network type in which every computer and network device is
connected to a single cable. It is bi-directional. It is a multi-point connection and a
non-robust topology because if the backbone fails the topology crashes. In Bus
Topology, various MAC (Media Access Control) protocols are followed by LAN
ethernet connections like TDMA, Pure Aloha, CDMA, Slotted Aloha, etc.
Figure 3: A bus topology with shared backbone cable. The nodes are connected to
the channel via drop lines.
• If N devices are connected to each other in a bus topology, then the number
of cables required to connect them is 1, known as backbone cable, and N
drop lines are required.
• Coaxial or twisted pair cables are mainly used in bus-based networks that
support up to 10 Mbps.
• The cost of the cable is less compared to other topologies, but it is used to
build small networks.
• Bus topology is familiar technology as installation and troubleshooting
techniques are well known.
Ring Topology:
In this topology, it forms a ring connecting devices with exactly two neighboring
devices.
A number of repeaters are used for Ring topology with a large number of nodes,
because if someone wants to send some data to the last node in the ring topology
with 100 nodes, then the data will have to pass through 99 nodes to reach the 100th
node. Hence to prevent data loss repeaters are used in the network.
The data flows in one direction, i.e.., it is unidirectional, but it can be made
bidirectional by having 2 connections between each Network Node, it is
called Dual Ring Topology. In-Ring Topology, the Token Ring Passing protocol is
used by the workstations to transmit the data.
1. One station is known as a monitor station which takes all the responsibility
for performing the operations.
2. To transmit the data, the station has to hold the token. After the transmission
is done, the token is to be released for other stations to use.
3. When no station is transmitting the data, then the token will circulate in the
ring.
4. There are two types of token release techniques: Early token release
releases the token just after transmitting the data and Delayed token release
releases the token after the acknowledgment is received from the receiver.
• The failure of a single node in the network can cause the entire network to
fail.
• Troubleshooting is difficult in this topology.
• The addition of stations in between or the removal of stations can disturb the
whole topology.
• Less secure.
Tree Topology :
This topology is the variation of the Star topology. This topology has a hierarchical
flow of data. In Tree Topology, protocols like DHCP and SAC (Standard
Automatic Configuration ) are used.
Figure 5: In this, the various secondary hubs are connected to the central hub
which contains the repeater. This data flow from top to bottom i.e. from the central
hub to the secondary and then to the devices or from bottom to top i.e. devices to
the secondary hub and then to the central hub. It is a multi-point connection and a
non-robust topology because if the backbone fails the topology crashes.
Hybrid Topology :
Figure 6: The above figure shows the structure of the Hybrid topology. As seen, it
contains a combination of all different types of networks.