<

Computer science from 3

Chapter 1 COMPUTER NETWORK COMMUNICATION

Lesson 4: NETWORK TOPOLOGIES

The topology of a network refers to the physical configuration of its components (physical topology) or the method of information flow between its components (logical topology). There are two types of network topology.

  1. Physical topology
  2. Logical topology

4.1) PHYSICAL TOPOLOGY

There are five types of physical topology:

 

  • Bus
  • Star
  • Ring
  • Mesh
  • Tree

 

4.1.) Bus Topology: The bus topology or network pattern in which all computers are connected to the same communication line. Communication goes in both directions along the line. The bus transforms information from one component to another in the computer. That is, they are wires.

 

Advantages

  • It is cheap and it is easy to set up.

 

 

Disadvantages

  • It is limited to size and speed.
  • The entire network short down if there is a break in main cable.
  • It is difficult to trouble shoot.

 

 

4.1.2) Star Topology: The star topology configuration is the configuration in which every computer is connected to the central equipment that can be a switch or a hub. All communication between computers go through the central device.

 

Advantages

  1. Easy to expand the network.
  2. The malfunctioning mode does not affect the rest of the network.
  3. Easy to trouble shoot because a problem usually isolate itself.

Disadvantages

  1. If the central equipment pay the entire network is disturbed.
  2. Cabling is expensive due to the connection of any device.

 

 

4.1.3) Ring Topology: The ring topology configuration connect each flow to its adjacent mode (peer to peer) and message are circulated around a closed ring pattern connect the computer and other devices one to the other in a ring or cycle.

 

Advantages

  • It provides equal access possibility for all computers.
  • It requires less cables and so, it is less expensive.

Disadvantages

  • It one node, the whole network will be down.
  • It is difficult to trouble shoot

 

 

4.1.4) Mesh Topology: The mesh topology is the network pattern that connects all computers one another directly (fully connected) or indirectly (partially connected). Internet is an example of mesh network.

 

 

Advantages

  • It is fast.
  • It is very reliable

Disadvantages

  • More skills are required
  • Expensive

 

4.1.5) Tree Topology: This is a network pattern that combines the characteristics of the bus and star topology. It consists of a series of branches converging indirectly to a control point.

 

Advantages

  • It allows for the expansion of an existing network.
  • It is supported by several hardware and software vendors.

Disadvantages

  • If the backbone line breaks, the segment goes down.
  • It is difficult to configure and wire.

 

 

4.2) LOGICAL TOPOLOGY

Logical topology refers to the manner in which data circulate in the network. There are three main logical topologies used in the network:

  • Token ring topology
  • Arc net topology
  • FDDI topology

4.2.1) Token Ring Topology: The token ring topology move between the computers inside a logical ring. The actual physical cable ring is through the hub. Users are a part of a ring but they connect to the ring through the hub.

 

4.2.2) Arc Net Topology: In the arc net (Attach Resources Computer Network), the token move from one computer to another based on node addresses instead of the physical location of computers. This means that arc net passes the token to the next addresses regardless of whether the addresses is on a workstation in the same roof or in separate building. Each computer in an arc net network is connected by a cable in a hub, which can be an active, passive or a smart hub. Arc net also supports twisted pair and fiber optic cable.

4.2.3) FDDI (Fiber Date Distribution Interface) Topology: FDDI uses dual ring architecture with traffic on each ring following in opposite directions (counter rotation). The dual-ring consists of a primary and secondary ring; During normal operation, the primary ring is used for data transmission and the secondary ring remains idle.

par Claude Foumtum