Professional Documents
Culture Documents
STANCHIS
[Pick the date]
RING TOPOLOGY
Ring network in which each node connects to exactly two other
nodes, forming a circular pathway for signals: a ring. Data
travels from node to node, with each node handling every
packet.
Because a network or ring topology provides only one pathway
between any two nodes, ring networks may be disrupted by the
failure of a single link. A node failure or cable break might
isolate every node attached to the ring. Fiber Distributed Data
Interface (FDDI),networks overcome this vulnerability by
sending data on a clockwise and a counterclockwise ring in the
event of a break data is wrapped back onto the complementary
ring before it reaches the end of the cable, maintaining a path to
every node along the resulting. The 802.5 networks also known
as IBM Token Ring networks avoid the weakness of a ring
topology altogether. They actually use a star topology at the
physical layer and a Multistation Access Unit to imitate a ring at
the datalink layer.
Many ring networks add a “counter-rotating ring” to form
redundant topologies. Such “dual ring” networks include Spatial
Reuse Protocol, fiber distributed data interface, and Resilient
Packet Ring.
2
Each device in the network that is also referred to as node
handles every message that flows through the ring. Each node in
the ring has a unique address. Since in a ring topology there is
only one pathway between any two nodes, ring networks are
generally disrupted by the failure of a single link.
3
The redundant topologies are used to eliminate network
downtime caused by a single point of failure. All networks need
redundancy for enhanced reliability. Network reliability is
achieved through reliable equipment and network designs that
are tolerant to failures and faults. The Fiber Distributed Data
Interface (FDDI), networks overcome the disruption in the
network by sending data on a clockwise and a counterclockwise
ring.
4
In case there is a break in data flow, the data is wrapped back
onto the complementary ring before it reaches the end of the
cable thereby maintaining a path to every node within the
complementary ring.
The most well known example of a ring topology is Token Ring.
Figure 0-1
5
TYPES OF RING TOPOLOGY
There are two types of ring single –ring and dual-ring.
SINGLE –RING; -In this only one cable is used to connect all
the node on the network, with this when a node failure or cable
break might isolate every node attached to the ring. In a true ring
topology, if a single computer or section of cable fails, there is
an interruption in the signal. The entire network becomes
inaccessible. Network disruption can also occur when computers
are added or removed from the network, making it an
impractical network design in environments where there is
constant change to the network.
6
DOUBLE –RING; Double ring consists of two independent
rings, a primary and a secondary, with traffic flowing in
opposite directions. A computer that is connected to both rings
is called a Dual Attachment Station (DAS), and when one of
the rings is broken by a Cable fault, the computer switches to
the other ring, providing continued full access to the entire
network. The double ring is suited to use as a Backbone
network.
7
ADVANTAGES AND DISADVANTAGES OF THE RING
TOPOLOGY
8
Figure 107: A ring network.