Professional Documents
Culture Documents
Session Coverage
Logical Topology:
It describes how the signal/data flows in the network.
In a logical bus topology, the data is sent to a trunk/backbone from where all the computers on
the network can simultaneously pick a copy of information. It is only the target computer that
will fully process the data and respond.
In a logical ring topology, the data travels around a circle in one direction from one
workstation/computer to another.
In a logical mesh topology, the data can travel through a number of paths to the destination.
The choice of the path here will depend on a number of factors e.g. data traffic on the path.
In a logical radial topology, data from a source to a destination device flows through an
intermediary device (Hub, Switch or MSAU)
Physical topology:
This describes the physical layout of the cables (media), workstations, servers and the
intermediary network devices like switches or hubs.
The advantage of this topology is that if one workstation goes down, the network continues to
function normally. But if the central interconnecting device goes down, the entire network
goes down.
Easy to identify and isolate a problem but consumes a lot of cable especially, where nodes are
located far from central device.
A switch is more intelligent, it utilizes a MAC address table and therefore able to direct the
data to the specific end device hence less collision is experienced. The characteristics of a
switch, hubs and other network devices will be covered later.
i. As compared to Bus topology it gives far much better performance, signals don’t
necessarily get transmitted to all the workstations. Performance of the network is
dependent on the capacity of central hub.
ii. Easy to connect new nodes or devices. In star topology new nodes can be added easily
without affecting rest of the network. Similarly components can also be removed
easily.
iv. Failure of one node or link doesn’t affect the rest of network. At the same time its easy
to detect the failure and troubleshoot it.
ii. The use of hub, a router or a switch as central device increases the overall cost of the
network.
iii. Performance and as well number of nodes which can be added in such topology is
depended on capacity of central device.
The main feature of a bus topology is the presence of a linear high speed cable called a
trunk/backbone on to which all the computers in a network are attached. Each transmits data
by sending the data to the trunk/backbone.
The computers in the network examine all the data on the backbone and will only accept and
process data addressed to them. By examining the IP address and the MAC address on the
packet, they are able to determine the destination of the packet.
The trunk/backbone is normally terminated at both ends just after the last node, to eliminate
signal echo or bouncing back. Where the trunk runs for a long distance, repeaters are normally
used at specific intervals to regenerate the signals.
The coaxial cable and the optical fiber cables are the main type of media used for the
backbone, to implement this type of topology. Performance begins to degrade/fail as more
workstations are added to the network.
i. Difficult to administer/troubleshoot
ii. Limited cable length and number of stations
iii. A cable break can disable the entire network; no redundancy
iv. Maintenance costs may be higher in the long run
v. Performance degrades as additional computers are added
This arrangement implements a physical star topology and a logical ring topology. In other
cases, computers are connected on a single cable (normally co-axial) that forms a loop.
The first computer to boot/start on the network generates a token, which is the main feature of
communication on the network.
The token is then passed from one computer to the next and it is only the computer with the
token that can transmit.
When a computer on the network receives the token, it strips the data from the token and
sends the token back to the sending computer with an acknowledgement.
Each computer on the network acts as a repeater i.e. it examines the addressing details on the
received packet, in comparison to its own, if the addresses do not match, it re-generates the
signal, before forwarding it to the next computer.
This topology eliminates collisions and it is therefore more efficient compared to other
topologies.
i. This type of network topology is very organized. Each node gets to send the data when
it receives an empty token. This helps to reduces chances of collision. Also in ring
topology all the traffic flows in only one direction at very high speed.
ii. Even when the load on the network increases, its performance is better than that
of Bus topology.
iii. There is no need for network server to control the connectivity between workstations.
i. Each packet of data must pass through all the computers between source and
destination. This makes it slower than Star topology.
ii. If one workstation or port goes down, the entire network gets affected.
iii. Network is highly dependent on the wire which connects different components.
d) Mesh Topology
This topology is normally used where fault tolerance is highly desirable. It provides a number
of alternative paths from one device to another i.e. all the computers on the network are
interconnected such when one path to a certain destination fails; an alternative path to the
same destination is always available.
Disadvantages
i. There are high chances of loops in many of the network connections.
ii. Compared to other network topologies, the overall cost of this network is high.
iii. Administration of the network is challenging.
iv. Set-up and maintenance is difficult
e) Daisy chains
The simplest of the complex topologies is developed by serially interconnecting all the hubs
of a network. This is called daisy-chaining. This simple approach uses ports on existing hubs
for interconnecting the hubs.
Small LANs can be scaled upward by daisy-chaining hubs together. Daisy chains are easily
built and don’t require any special administrative skills. Daisy chains were, historically, the
interconnection method of choice for emerging, first-generation LANs.
The distance limitations imposed by the Physical layer, multiplied by the number of devices,
dictate the maximum size of a LAN. This size is referred to as a maximum network diameter.
Scaling beyond this diameter adversely affects the normal functioning of that LAN.
Daisy-chaining networks that use a contention-based media access method can become
problematic long before network diameter is compromised, however.
Disadvantage:
Daisy-chaining increases the number of connections, and therefore the number of devices, on
a LAN. It does not increase aggregate bandwidth or segment collision domains. Daisy-
chaining simply increases the number of machines sharing the network’s available
bandwidth. Too many devices competing for the same amount of bandwidth can create
f) Hierarchical rings (Old and Used mainly in CAN and MAN Networks))
Ring networks can be scaled up by interconnecting multiple rings in a hierarchical fashion.
User station and server connectivity can be provided by as many limited size rings as are
necessary to provide the required level of performance.
A second-tier ring, either Token Ring or FDDI, can be used to interconnect all the user level
rings and to provide aggregated access to the Wide Area Network (WAN).
The network designer must develop a strategy to enable the network to be available and scale
easily and effectively.
Use expandable, modular equipment or clustered devices that can be easily upgraded to
increase capabilities.
Design a hierarchical network to include modules that can be added, upgraded, and modified
as needed.
Choose routers or multilayer switches to limit broadcasts and filter undesirable traffic from
the network.
Implement redundant links between critical devices and between access and core layers.