Computer Network Topology
When you are creating a new network the first most important thing to think of is the type of network topology to use. The term network topology refers to the arrangement or physical layout of computers, cables, and other components on the network.
We have a number of network topologies that can be implemented on a network:
The Bus Topology
In the bus topology computers and other devices are linked to another by tapping into a common central cable. This kind of a network topology shares a common single cable. It is often referred to as a linear bus because the computers are connected in a straight line. Both ends of the network cable are terminated using a terminator to prevent signals from bouncing back. If signals bounce back, they will cause interference within the network.
In the bus topology, data packets (a piece of message sent through a network) are sent to all computers on the trunk. Each computer examines every packet on the wire to determine who the packet is for and accepts only messages addressed to them. Usually, bus topology makes use of thinnet or thicknet media type. The devices connected in the bus are referred to as nodes.
The Star Topology
In the star topology, all systems are connected to a centralized multiple port device called a hub (obsolete) or a switch. Data packets or signals are transmitted from the sending computer through the switch to the respective computer on the network.The switch is an intelligent devices that controls the flow of data within the network.
The star topology is widely used nowadays. It offers Centralized monitoring management and it is easy to modify and add new computers. If one computer fails it will not affect the rest of the network, but if the switch fails the whole network segment will be down.
Ring or Loop Topology
In a ring or loop topology, as the name suggests, the computers are wired on a single circle of cable, such that they are organized into a ring or a loop. Each station acts as a repeater and keeps the signal strong by repeating it or regenerating it.
The ring topology makes use of token passing access method. A token can be seen as an envelope or a bag where data is placed for transmission around the token ring network. Only the computer with the token is allowed to transmit. On receiving the data, the computer receiving it checks the source and destination address of the data packets to determine where the data is coming from and its destination. If it does not belong to it, it will be passed to the next computer.
In a mesh topology, each computer is connected to every other computer by separate cabling. That means every computer has multiple possible connection paths to the other computers on the network, so a single cable break will not stop network communications between any two computers.
This kind of configuration used in mesh topology provides redundant paths throughout the network so that if one cable fails, another will take over the traffic. Nodes that are not directly connected make use of intermediate nodes. A mesh topology network offers superior redundancy and reliability.
Was this hub helpful?
© 2011 Patrick Kamau