Logo

Navigation
  • Home
  • Services
    • ERP Solutions
    • Implementation Solutions
    • Support and Maintenance Solutions
    • Custom Solutions
    • Upgrade Solutions
    • Training and Mentoring
    • Web Solutions
    • Production Support
    • Architecture Designing
    • Independent Validation and Testing Services
    • Infrastructure Management
  • Expertise
    • Microsoft Development Expertise
    • Mobile Development
    • SQL Server Database and BI
    • SAP BI, SAP Hana, SAP BO
    • Oracle and BI
    • Oracle RAC
  • Technical Training
    • Learn Data Management
      • Business Intelligence
      • Data Mining
      • Data Modeling
      • Data Warehousing
      • Disaster Recovery
    • Learn Concepts
      • Application Development
      • Client Server
      • Cloud Computing Tutorials
      • Cluster Computing
      • CRM Tutorial
      • EDI Tutorials
      • ERP Tutorials
      • NLP
      • OOPS
      • Concepts
      • SOA Tutorial
      • Supply Chain
      • Technology Trends
      • UML
      • Virtualization
      • Web 2.0
    • Learn Java
      • JavaScript Tutorial
      • JSP Tutorials
      • J2EE
    • Learn Microsoft
      • MSAS
      • ASP.NET
      • ASP.NET 2.0
      • C Sharp
      • MS Project Training
      • Silverlight
      • SQL Server 2005
      • VB.NET 2005
    • Learn Networking
      • Networking
      • Wireless
    • Learn Oracle
      • Oracle 10g
      • PL/SQL
      • Oracle 11g Tutorials
      • Oracle 9i
      • Oracle Apps
    • Learn Programming
      • Ajax Tutorial
      • C Language
      • C++ Tutorials
      • CSS Tutorial
      • CSS3 Tutorial
      • JavaScript Tutorial
      • jQuery Tutorial
      • MainFrame
      • PHP Tutorial
      • VBScript Tutorial
      • XML Tutorial
    • Learn Software Testing
      • Software Testing Types
      • SQA
      • Testing
  • Career Training
    • Career Improvement
      • Career Articles
      • Certification Articles
      • Conflict Management
      • Core Skills
      • Decision Making
      • Entrepreneurship
      • Goal Setting
      • Life Skills
      • Performance Development
      • Personal Excellence
      • Personality Development
      • Problem Solving
      • Relationship Management
      • Self Confidence
      • Self Supervision
      • Social Networking
      • Strategic Planning
      • Time Management
    • Education Help
      • Career Tracks
      • Essay Writing
      • Internship Tips
      • Online Education
      • Scholarships
      • Student Loans
    • Managerial Skills
      • Business Communication
      • Business Networking
      • Facilitator Skills
      • Managing Change
      • Marketing Management
      • Meeting Management
      • Process Management
      • Project Management
      • Project Management Life Cycle
      • Project Management Process
      • Project Risk Management
      • Relationship Management
      • Task Management
      • Team Building
      • Virtual Team Management
    • Essential Life Skills
      • Anger Management
      • Anxiety Management
      • Attitude Development
      • Coaching and Mentoring
      • Emotional Intelligence
      • Stress Management
      • Positive Thinking
    • Communication Skills
      • Conversation Skills
      • Cross Culture Competence
      • English Vocabulary
      • Listening Skills
      • Public Speaking Skills
      • Questioning Skills
    • Soft Skills
      • Assertive Skills
      • Influence Skills
      • Leadership Skills
      • Memory Skills
      • People Skills
      • Presentation Skills
    • Finding a Job
      • Etiquette Tips
      • Group Discussions
      • HR Interviews
      • Interview Notes
      • Job Search Tips
      • Resume Tips
      • Sample Resumes
 

Network Topology

By Exforsys | on February 25, 2008 |
Networking

Network Topology

There are two levels in a network topology and there are five kinds of network topologies. The networks can be connected at two levels, the physical and the other is logical. A topology basically defines how the network has to be designed and provides a structure to the network.

The five different kinds of topologies are

• Bus
• Ring
• Star
• Tree
• Mesh

Bus Topology

The bus topology is a series of nodes which are all connected to a backbone. Bus networks typically work well for smaller networks and use Ethernet cables for networking. It is easy to maintain and troubleshoot in a bus network. All the nodes in a bus network are dependant on the backbone and even if one node fails the remaining nodes work.

Ring Topology

A ring network is circular in shape and every node will have one node on either side of it. The ring topology is rare to come across because of its limitations. If there is damaged cable or breakdown in any one of the nodes then the entire network stops functioning.

Star Topology

A star topology is based on a central node which acts as a hub. A star topology is common in homes networks where all the computers connect to the single central computer using it as a hub. The medium used to connect is the UTP or the untwisted pair cable. In case one node stops functioning or if there is cable damage the rest of the network would still work.

Tree Topology

The tree topology is a group of star networks put together. The only difference is that the tree topology follows a hierarchy in structure and the entire tree is dependant on this hierarchy.

Mesh Topology

Mesh topology is a group of nodes which are all connected to each other and many types of connections are possible in a mesh topology. Every single node is connected to the other nodes in a mesh topology and the chances of connection break downs are very minimal in a mesh topology. Mesh topology is mostly used on a WAN.

Network topologies are the most important part of the communication and the communication begins in the network. There are many kinds of network, the cabled network, the wireless technology, mobile technology, satellite communications and a combination of all these. Wireless network are increasingly becoming popular among many companies so that they need not spend too much on cabling and it is convenient too. However there are security issues in wireless technology and if the network has to be highly secure then cable is still the best bet.

A company may choose to sue any type of network but they still need a topology to design the communications system and plan the data flow and which order data will take while traveling. This is very important and for this you need to decide one of the topology formats. Even wireless networks need to conform to a star, mesh, or a tree topology.


In order to set up a network a person should be a network engineer and should know the functionalities of the network topology from a physical level. Then there is the logical or the software level where the network needs to be programmed. However the primary step is at the physical level. Once the network is set up physically then the software’s can be installed and the protocols can be configured. Troubleshooting networks at the logical level is very simple, but the same cannot be said at the physical level. To identify the problem the network engineer should know the entire functioning of the network topologies.

« « Network Management
Home Networking » »

Author Description

Avatar

Editorial Team at Exforsys is a team of IT Consulting and Training team led by Chandra Vennapoosa.

Free Training

RSSSubscribe 394 Followers
  • Popular
  • Recent
  • How to Effectively Protect Your System

    November 28, 2011 - 0 Comment
  • Mesh Topology

    March 2, 2008 - 0 Comment
  • IPv6

    March 20, 2008 - 0 Comment
  • Data Protection Protocols

    November 30, 2011 - 0 Comment
  • Star Topology

    March 2, 2008 - 0 Comment
  • High Level Data Link Control (HDLC)

    March 29, 2008 - 0 Comment
  • How to use Hashes to Ensure Integrity

    November 30, 2011 - 0 Comment
  • Tree Topology

    March 4, 2008 - 0 Comment
  • Asynchronous Transfer Mode (ATM) Switching

    February 13, 2008 - 0 Comment
  • Internet Protocols (IP)

    March 5, 2008 - 0 Comment
  • How to use Hashes to Ensure Integrity

    November 30, 2011 - 0 Comment
  • Data Protection Protocols

    November 30, 2011 - 0 Comment
  • How to Effectively Protect Your System

    November 28, 2011 - 0 Comment
  • Network Security Firewall and Architecture

    November 26, 2011 - 0 Comment
  • Preventing Network Intrusion

    November 24, 2011 - 0 Comment
  • Creating and Developing Security Policies

    November 23, 2011 - 0 Comment
  • Linux Thin Client Networks Design and Deployment

    October 2, 2009 - 0 Comment
  • High Level Data Link Control (HDLC)

    March 29, 2008 - 0 Comment
  • IPv6

    March 20, 2008 - 0 Comment
  • High-Speed Serial Interface (HSSI)

    March 20, 2008 - 0 Comment

Exforsys e-Newsletter

ebook
 

Related Articles

  • How to use Hashes to Ensure Integrity
  • Data Protection Protocols
  • How to Effectively Protect Your System
  • Network Security Firewall and Architecture
  • Preventing Network Intrusion

Latest Articles

  • Project Management Techniques
  • Product Development Best Practices
  • Importance of Quality Data Management
  • How to Maximize Quality Assurance
  • Utilizing Effective Quality Assurance Strategies
  • Sitemap
  • Privacy Policy
  • DMCA
  • Trademark Information
  • Contact Us
© 2023. All Rights Reserved.IT Training and Consulting
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.AcceptReject Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT