Вы находитесь на странице: 1из 2

Assignment 1

Comparison between Network Topologies


Name: Mahmoud Yehia Mahmoud Ali Kamel Student Number: 20043250
1 Abstract
Network topology is the arrangement of the various nodes of a computer network, essentially, it is the topological structure of a
network and may be depicted physically or logically, graphically mapping the links between nodes results in a geometric shape
that can be used to describe the physical topology of the network. Here is a comparison between various Topologies.

2 Comparison
Topology Architecture/ Routing Complex Expansio Reliability Cost Cabling Security Delay/Respons
organization Methodology ity n Concerns e time

Star A network topology in All information Very Add a new When one More expensive of Uses twisted pair denial of service Excellent in terms
which peripheral nodes passes through simple(Us computer computer goes the simple cable. attack of distance
are connected to a central the central ed for by plugging down, the rest topologies, it Requires large
node(such as a hub, network LANs) in a new of the network requires costly amounts of cable.
switch, or router) which connection. cable from is unaffected. If connection No more than 100
rebroadcasts all the the connection device. Usually meters from the
transmissions received computer to device goes cheaper than a computer to the
from any peripheral node the down, then the hybrid network. connection
to all peripheral nodes on connection network is device.
the network, including the device. down.
originating node. All
peripheral nodes may
thus communicate with all
others by transmitting to,
and receiving from, the
central node only
Bus is a network topology in One computer at The To add a If one A cheaper Single continuous Not secure cause Delay cause
which there is a single a time sends Simplest computer, cable connects broadcast broadcast
line (the bus) to which all information. one(Used you must
computer network since the devices.
nodes are connected, and Information goes for shut down malfunctions there is Terminator is
the nodes connect only to along the cable LANs) the network , the entire usually one required at each
this bus. This is a bus line and the computer and network continuous end of the cable.
going through a city. The accesses the disconnect Uses coaxial or
goes down. copper cable.
cable has a small cap information off the the cable twisted pair
installed at the end, called cable. from the cabling.
a terminator. The existing
terminator prevents computers.
signals from bouncing
back and causing network
errors. Like a series of
pipes that water travels
through
Ring A network topology in Information goes (Used for Cable If there's a One of the more Requires more The least security good
which every node has in one direction LANs) between break in the expensive cabling than other as the information
exactly two branches around the ring the cable or an topologies due to topologies. Uses Intended for one
connected to it. A star- and passes along computers error in the high cable costs. twisted pair. machine must
wired ring topology may the ring until it must be network, pass all the others
appear (externally) to be reaches the broken to information
the same as a star correct computer. add a new continues to
topology. Internally, the computer, transfer through
MAU (multistation access so the the rest of the
unit) of a star-wired ring network is ring until
contains wiring that down until reaching the
allows information to pass the new point of the
from one device to device is break. This
another in a circle or ring. back online. makes
point-to point links in a troubleshooting
closed loop. easy.

Mesh A network topology in Often used across Used for Connection Troubleshootin Expensive, large, Cabling depends A mesh needs Trade off with cost
which there are at least long distances. WANs devices g is most and usually on the types of secure links,
two nodes with two or Information make difficult in this complicated. networks. routing, and
more paths between transfer can combining topology Can use twisted forwarding
them. happen in different because of the pair and coaxial
different ways, networks variety of cable. Also
depending on the and technologies. incorporates fiber
other topologies. different optic cabling over
topologies long distances.
easy.
Token-ring Token-passing networks A specially- (Used The more A single Fairly low Twisted Pair Low security as it Not bad (No data
move a small frame, formatted frame, workstation malfunctioning physically star but collisions.)
called a token, around called a token,
for s causes workstation can logically ring
The network. Possession travels around the LANs) slower the disable the
of the Token grants the ring, stopping at response network
right to transmit. If a node each host.. The time
receiving the token has destination host Not very
no information to send, it takes the data out flexible or
passes the token to the of the frame. No scalable
next end station And the data collisions.
process repeats itself.
Each station can hold the
token For a maximum
period of time.
Tree The nodes are arranged a transmission Used for The N.W partitioned Costly because it Overall length of Low security as it Possible traffic
as a tree. The tree from any station simplest to easily, but is heavily cabled each segment is physically star but jams.
WANs
topology is a Propagates install and partitions still limited by the type logically bus
generalization of the bus throughout the extend work. of cabling used.
topology. The medium and can extra (Coax - Twisted
transmission medium is a be received by all Stations in Pair – Fiber)
branching cable with no other stations. . A a daisy
closed loops. The tree host that is a chain
layout begins at a point branch off from manner,
known as the head end the main tree is
(Root), where one or called a ‘leaf’.
more cables start, and
each of these may have
branches. The branches
in turn may have
additional branches to
allow quite complex
layouts.
Fully A fully connected Many paths with Used for difficult to The most Expensive due to All kind of cables Secured Too slow, add
connected topology is a network fault Expand reliable one, high cable costs. that can be used more links.
topology in which there is tolerance
WANs doesn't with LAN and
a direct link between all have single WAN
pairs of nodes. In a fully point of
connected network with n failure/attack
nodes, there are n (n-1)/2
direct links. Synonym fully
connected mesh network.

3 Conclusion
Choice of network topology must be done very carefully and professionally based on many design parameters such as security,
complexity, reliability, cost and many other design parameters that define the best topology that can meet effectively the
requirements of a network infrastructure.

4 References
1- “types of network topology” http://www.studytonight.com/computer-networks/network-topology-types
2- “network topologies” https://www.edrawsoft.com/Network-Topologies.php
3- “network topology comparison”
https://www.google.com.eg/url?sa=t&rct=j&q=&esrc=s&source=web&cd=8&cad=rja&uact=8&ved=0ahUKEwii3Lq
D-6fLAhXFWhoKHWxFB-EQFgg1MAc&url=http%3A%2F%2Fburgate-ict.pbworks.com%2Ff%2FTopic%2B4%2B-
%2BNetwork%2BTopology%2BComparison.DOC&usg=AFQjCNEyB441lLduH1FE7qR6ICVQFHuZPA&sig2=T0lV
8mpu7qc82du1vcgvDA
4- “Advantages and disadvantages of different network topologies” http://www.buzzle.com/articles/advantages-and-
disadvantages-of-different-network-topologies.html

Вам также может понравиться