Topologies
The physical appearance of a
network is called topology. Topology refers to the arrangement, configuration,
or shape of the wires, computers, or other components that are physically and
logically interconnected in data communication.
Logical topology – how data
flows via the network.
Physical topology – how the
network is physically structured.
There are 5 types of
topologies.
1. BUS topology
2. Mesh topology
3. RING topology
4. STAR topology
5. TREE topology
We are now having a question
about what is the need for these 5 topologies. Is there any advantage that you
can store for taking out a topology? Yes, it has the advantage of choosing a
particular type of topology. I’ll talk about it when I teach topologies.
1. BUS topology
- The main cable is laid out and every device or computer is connected to it.
- It transfers the data in a single direction.
- It has a multipoint connection.
- The mainline is the backbone of this topology. If it fails, then the whole system will fail.
- It is used in 802.3 ethernets and 802.4 standard networks.
- When a node wishes to transmit a message across the network, it sends the message to the whole network regardless of whether the message has any information is used by all of the devices.
- The most popular access mechanism is CSMA (Carrier Sense Multiple Access).
Advantage
- Cabling cost is less. The only main cable is laid out. But if we attach N computers to it, N drop lines are also needed.
- Easy to install.
- Can be scalable.
- If a device fails, then the rest of the devices can work.
- It is used to build smaller networks.
- Reliable.
- Support up to 10 Mbps data speed.
- Troubleshooting is difficult. Because if a device fails, then there is very difficult to find that device.
- If two devices send the message at the same time, then a collision happens. CSMA/CD and CSMA/CA came into the picture.
- In a large topology, repeaters are used in the main cable to regenerate the signal.
- If the main cable fails, then the topology fails.
- Not secure communication, because the message is broadcasted to every device.
- The main cable can be extended by using BNC connectors. A loose BNC connector fails the network.
2. Mesh Topology
- Every device is connected to every other device in the topology, with a dedicated link.
- Secure because of a dedicated line.
- Mesh topology is the Internet used in WAN (World Area Network).
- It usually works as a wireless network; hence it requires no cabling cost but different wireless signals cost too much.
- If there are N devices connected in a topology, then N(N-1)/2 cables are required.
- If there are N devices connected in a topology, then N-1 ports are required in every device and this is a very complex task. These days, partial mesh topology is used. In partial mesh, some devices are not connected by a dedicated link. If the sender wants to send a message to the receiver, then an alternative path is used by trusted devices.
Advantage
- Dedicated line hence secure and private also.
- Reliable because if a computer fails, it will have no impact on the rest of the computers.
- Easy configuration.
- Troubleshooting is easy.
- No traffic problem.
- Full bandwidth usage.
Disadvantage
- Installation is difficult.
- Most costly in every topology.
- Maintenance cost is high.
3. Ring Topology
- This topology is in the form of a ring. Each device is connected to its two neighbors on two sides of the cable. The last device is connected to the first device.
- If the bus topology design rear part of the cable is connected to the front part of the cable, then ring topology is made. It’s an IEEE 802.5 standard.
- Transmission is unidirectional and several repeaters are attached because if device ‘A’ wants to send data to device ‘F’, it will pass through a long route. So, repeaters are attached so that signal does not attenuate.
- Bi-directional transmission is also there, but it will add one more main cable as a ring and its direction of transmission is opposite to the other main cable. It is called a Dual-Ring Topology.
- Rings are generally used as a high-performance topology where full bandwidth is used to share videos, high-resolution images, and audio.
- Ring topology does token passing. A token is a short message that is passed around the ring. Suppose, A device wants to transfer a message to the other device. So, it will capture the token and put the message on the token, and move it on a unidirectional side. Every device receives the token, that is in the token’s way. They match the address of self to the address of the token. If it does not match with anyone, the token moves to the sending device, and sending device will demolish the token. If the address matches, with any other device, then that device will receive the message and sends an acknowledgment to the sending device by generating a new token. The sending device on receiving an acknowledgment generates a new token, that is passed in a unidirectional way until another device captures it to send the message.
Advantage
- Cheap because we use a twisted pair cable and it is inexpensive.
- Easy to install.
- Can be scalable.
- It is used to build smaller networks.
- Every device can share in an equal manner.
Disadvantage
- Slower network.
- Troubleshooting is difficult.
- Adding or removing a device can change the routing table.
- Less secure.
- Network
crashes by the failure of one wire. Some will tell you that if a device fails,
the whole network crashes in a ring topology. They are referring to this
diagram. If a device or a wire
fails, then the whole network crashes.
4. Star Topology
- In star topology, a hub is in the center of the topology, and computers are connected to the hub by a wire.
- If N computers are used, then N cables are used.
- Each Computer provides a dedicated channel with the hub.
- Reliable because if one computer fails then the rest of the computers work. But if the hub failed then the whole system crashes.
- If the hub is an active device and based on a switch then it can send the information to only one computer to which it belongs. But if the hub is a passive device then it broadcast the information to all the computers, which breached the security.
- Example – Ethernet Base 10
- The hub can be of three types
- Layer-1 device – Repeater or Hub
- Layer-2 device – Switch or Bridge
- Layer-3 device – Router or Gateway.
Advantage
- Easy to use.
- Scalable.
- Secure with an active hub.
- Cheap.
- Troubleshooting is easy.
- Supports 100 Mbps speed.
Disadvantage
- If the hub fails, the whole system crashes.
- Not secure with a passive hub.
- All the star topology is controlled by a Central Hub.
- The central hub is an active device. The remaining hubs may be passive or active devices.
- The central hub has a repeater that increases the signal distance.
Advantage
- Several devices can be connected by a tree topology.
- An isolated network can be achieved.
- Support broadcasting. Example – Cable TV network, Wi-Fi network.
- Easily managed.
- Dedicated link to every computer.
Disadvantage
- Central hub fails, topology fails.
- High cost as broadcasting happens.
0 Comments