International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 1, January 2013)

A Study And Analysis on Computer Network Topology For
Data Communication
Santanu Santra1, Pinaki Pratim Acharjya2
1,2
Assistant Professor, Department of CSE, Bengal Institute of Technology and Management, Santiniketan
Abstract— In recent days for computing, distributed The section 2 is a brief description of physical
computer systems have become very important and popular topologies. The section 3 introduces the logical topologies
issue. It delivers high end performance at a low cost. and finally conclusions are discussed in section 4.
Autonomous computers are connected by means of a
communication network in a distributed computing
environment which is arranged in a geometrical shape called II. PHYSICAL TOPOLOGY
network topology. In the present paper a detailed study and Physical Network Topology emphasizes the hardware
analysis on network topologies is presented. Definitions of associated with the system including workstations, remote
Physical and Logical Topologies are also provided. terminals, servers, and the associated wiring between
assets. Physical topology defines how the systems are
Keywords— Network topology, Physical Network
Topology, Logical Network Topology.
physically connected. It means the arrangement of devices
on a computer network through the actual cables that
I. INTRODUCTION transmit data. There are eight basic topologies. In below
each of these topologies are described.
Distributed computing systems have become the
essential aspect of growing information technology. The A. Point to point
performance of any distributed system is certainly A point to point topology is a direct connection between
influenced by the technology, which we adopt in making two devices (nodes), the value of a permanent point-to-
network interconnections. Network topologies [1-2, 8-9]are point network is unimpeded communications between the
the technology for arrangement of various computer two endpoints. One example of this is a PC connected to a
elements like links, nodes etc. Basically network topology printer. A more common example is a mainframe terminal
is the topological structure [5] of a computer network. In connected to a mainframe front-end processor.
mathematics topology is concerned with the connectedness
of objects which is the most basic properties of space. In
simple way network topology refers to the way in which
the network of computers [5, 6-7] is connected. Each
topology is suited to specific tasks and has its own Figure I. Point-to-point.
advantages and disadvantages. A most simple and good
example of network topology is LAN [3-4, 8-9]. Where it B. Bus
LAN has one or more physical links to other devices in the The bus topology carries the transmitted message along
network. In recent days there are basically two basic the cable. As the message arrives at each device (node), the
categories of network topologies: Physical topologies [8-9] nodes checks the destination address contained in the
and Logical topologies [8-9]. Physical Network Topology message to see if it matches its own. If the address does not
emphasizes the hardware associated with the system match, the node does nothing more. A major disadvantage
including workstations, remote terminals, servers, and the of this network topology is that if the node address matches
associated wiring between assets. Conversely, Logical that contained in the message, the node processes the
Network Topology emphasizes the representation of data message. The message is transmitted along the cable and is
flow between nodes. In this paper a brief description on visible to all devices connected to that cable. issues with
these topologies are presented. This paper is organized as security as data is broadcasted across the network and
the following. single point of failure - if hub or backbone goes down.

522

A major disadvantage of this network topology is that if the central hub fails. The data passes from one device to the next one and all the way around the ring layout until it reaches the destination node. Ring being used and tree topology network is entirely dependent on the trunk which is the main backbone of the network. the network does not work. connected to one another in a circle. Each star network is a local area network (LAN) in which there is a central computer or server to which all the connected nodes directly linked. Ring Topology 523 . Issue 1. Bus Topology C. Figure II.com (ISSN 2250-2459. Mesh In this type of topology each device is interconnected with one another. Figure VI. January 2013) E. Tree topology is a combination of two or more bus and the Star Topology connected together. Failure of the central hub renders the network inoperable. Star Topology length of the network depends on the type of cable that is D. A major disadvantage is that if a single device is switched off. Figure V. Tree Tree Structure suits best when the network is widely spread and vastly divided into many branches. Tree Figure IV. The central computers of the star networks are connected to a main cable called the bus. A major disadvantage is high chances of redundancy in many of the network connections and overall cost is too high compared to any other network topology. A major disadvantage is the Figure III.ijetae. all computers connected to that hub would be disconnected. ISO 9001:2008 Certified Journal. Volume 3. If In a ring topology all of the nodes or devices are that has to fail then the entire network would fail. Star Star topology is one of the most common network setups where each of the devices or nodes on a network connects to a central hub. allowing for most transmissions to be distributed even if one of the connections goes down. A major disadvantage of this network topology is high dependence of the system on the functioning of the central hub. Mesh Network F. International Journal of Emerging Technology and Advanced Engineering Website: www.

whenever they need it. The master a result this collision kills the packets. It means logical networks are difficult to set up and troubleshoot. Hybrid Topology. 524 . Daisy Chain of this topology as more than one system send information A daisy-chained network topology is all of your devices out on the wire at the same time. As a remedy some connects to another slave device. ISO 9001:2008 Certified Journal. the packets collide and as are connected in a chain.ijetae.like or ring fashion. connected in the case of a single failure. Token Based Topology disadvantage is a component failure or cable failure in In token based topology a token is used which travels midstream will disable the entire network and if you want around the network to access the physical media. Daisy Chain Topology. therefore be more vulnerable to accidental disconnections and breaks. Collision is the main disadvantage H. The main role of logical topology is to communicate across the physical topologies among different systems.com (ISSN 2250-2459. disadvantage is typically more expensive than other networks since it exploits the features of its component III. and so on. A major B. which in turn example of a shared media topology. A. Volume 3. and so on. slave device. the node wants to send a packet to another one it should wait network will get down during the process. Hybrid Hybrid topology is a network topology that is composed of one or more interconnections of two or more networks that are based upon different physical topologies or a type of network topology that is composed of one or more interconnections of two or more networks that are based upon the same physical topology. which connects to another huge networks are broken down into smaller networks. There are two categories of logical topologies: Shared media topology and token-based topology. If any to add a device in the middle of the chain or ring. Issue 1. The cabling for for the token which is traverse within the network either these networks is generally put in open space and may clockwise or anti-clockwise direction. Hybrid representation of data flow between nodes. A major Figure VIII. International Journal of Emerging Technology and Advanced Engineering Website: www. It requires more cabling between its hardware Logical Network Topology emphasizes the devices than other types of network topologies. January 2013) G. LOGICAL TOPOLOGY topologies. topology is associated with the arrangement of devices on a computer network and how they communicate with one another. If the ring breaks at a Some ethernet uses Carrier Sense Multiple Access protocol particular link then the transmission can be sent via the to reduce the number of collisions. but where the physical topology of the network resulting from such an interconnection does not meet the definition of the original physical topology of the interconnected networks. Shared Media Topology In shared media topology the systems have unrestricted access to the physical media that is all the systems in a network have the ability to access the physical layout Figure VII. Ethernet is an controller connects to a slave device. reverse path thereby ensuring that all nodes are always Recommended font sizes are shown in Table 1.

January 1988. discussion can be adapted to related computer network 4th edition. M. performance of different kinds of IEEE Journal on Selected Areas in Communications. Jain. Backes. 2260- 2269. This research work can also be extended [9] D. "Regular multihop logical topologies for lightwave networks". On knowledge of analysis approaches for dealing with network page(s): 1005 . Gerla. [6] Nicholas F. Number 2. Ram Krishnan "A Comparison of Linear IV.ijetae. Proceedings. Soon Chang Kwon. J. Shivendra PanWar "Topological Design of Interconnected LAN-MAN Networks". Fundamentals of Queueing Theory. 1404 – 1407.18 Volume: 2. 1992. 18-21 Oct. Englewood further. 823-833. Data Networks. pp. 5-9. S. applications. and Cybernetics PartB. L.1013 vol. John Wiley & Sons.3. Issue 1. 2006.. Maxemchuk. nodes should check the destination address. Yong Oon Park. 1992. Number 8. pp. if it matches to MAN. S. and all the intermediate [4] Li Chiou Chen "The Impact of Countermeasure Propagation on the Prevalence of Computer Viruses" IEEE Transactions on Systems. Issue: 1. Volume 3.. acknowledgement packet. International Journal of Emerging Technology and Advanced Engineering Website: www. Wiley Series in Probability and Statistics.. 2nd ed.NJ: Prentice-Hall. V. CONCLUSION and Mesh Technologies---DQDB and Manhattan Street Network" In this paper. "Topological design of the inherent advantages and disadvantages computer network wavelength-division optical network". IEEE INFOCO. M. topology related problems. INFOCOM. First Quarter 1999. Description of some [7] Bannister. REFERENCES [1] Banerjee. 1990. January 2013) After getting the token a node can send the packet [3] F.A. October 1993. 2008. ―Transparent Bridges for Interconnection of IEEE 802 LANs.. Ninth Annual topologies to any system under study also has been Joint Conference of the IEEE Computer and Communication described in this paper. towards the network and all the nodes within the path from sender node to destination node. IEEE... IEEE. Cliffs. April 2004. Industrial Network" SICE-ICASE International Joint Conference. anyone it should accept the packet and generate an pp.com (ISSN 2250-2459. NJ. Communications Surveys & Tutorials.. Acknowledgement packet should [5] Geon Yoon. Gallager. USA. Dae Hyun Kwan. Volume 11. topologies is considered and studied. 525 . This paper has provided some Societies. [2] Cem Ersoy. Cybernetics Volume 34. ISO 9001:2008 Certified Journal. follow the reverse path to acknowledge the sender node Young Joon Lee "Ring Topology-based Redundency Ethernet for that the packet is received by the destination node. Harris. Fratta. The techniques covered in this [8] C. Bertsekas and R. The Multiple Facets of Integration.‖ IEEE Network. On page(s): 2 . pp. Hoboken. Shah.