CN Module 01
CN Module 01
In Computer Network, there are various ways through which different components
are connected to one another. Network Topology is the way that defines the
structure, and how these components are connected to each other.
The arrangement of a network that comprises nodes and connecting lines via sender
and receiver is referred to as Network Topology. The various network topologies are:
Mesh Topology
Star Topology
In Star Topology, all the devices are connected to a single hub through a cable. This
hub is the central node and all other nodes are connected to the central node. The
hub can be passive in nature i.e., not an intelligent hub such as broadcasting
devices, at the same time the hub can be intelligent known as an active hub. Active
hubs have repeaters in them. Coaxial cables or RJ-45 cables are used to connect
the computers. In Star Topology, many popular Ethernet LAN protocols are used as
CD(Collision Detection), CSMA (Carrier Sense Multiple Access), etc.
Figure 2: A star topology having four systems connected to a single point of
connection i.e. hub.
If N devices are connected to each other in a star topology, then the number
of cables required to connect them is N. So, it is easy to set up.
Each device requires only 1 port i.e. to connect to the hub, therefore the total
number of ports required is N.
It is Robust. If one link fails only that link will affect and not other than that.
Easy to fault identification and fault isolation.
Star topology is cost-effective as it uses inexpensive coaxial cable.
If the concentrator (hub) on which the whole topology relies fails, the whole
system will crash down.
The cost of installation is high.
Performance is based on the single concentrator i.e. hub.
A common example of star topology is a local area network (LAN) in an office where
all computers are connected to a central hub. This topology is also used in wireless
networks where all devices are connected to a wireless access point.
Bus Topology
Bus Topology is a network type in which every computer and network device is
connected to a single cable. It is bi-directional. It is a multi-point connection and a
non-robust topology because if the backbone fails the topology crashes. In Bus
Topology, various MAC (Media Access Control) protocols are followed by LAN
ethernet connections like TDMA, Pure Aloha, CDMA, Slotted Aloha, etc.
Figure 3: A bus topology with shared backbone cable. The nodes are connected to
the channel via drop lines.
If N devices are connected to each other in a bus topology, then the number
of cables required to connect them is 1, known as backbone cable, and N
drop lines are required.
Coaxial or twisted pair cables are mainly used in bus-based networks that
support up to 10 Mbps.
The cost of the cable is less compared to other topologies, but it is used to
build small networks.
Bus topology is familiar technology as installation and troubleshooting
techniques are well known.
CSMA is the most common method for this type of topology.
A common example of bus topology is the Ethernet LAN, where all devices are
connected to a single coaxial cable or twisted pair cable. This topology is also used
in cable television networks. For more, refer to the Advantages and Disadvantages
of Bus Topology.
Ring Topology
In a Ring Topology, it forms a ring connecting devices with exactly two neighboring
devices. A number of repeaters are used for Ring topology with a large number of
nodes, because if someone wants to send some data to the last node in the ring
topology with 100 nodes, then the data will have to pass through 99 nodes to reach
the 100th node. Hence to prevent data loss repeaters are used in the network.
The data flows in one direction, i.e. it is unidirectional, but it can be made
bidirectional by having 2 connections between each Network Node, it is called Dual
Ring Topology. In-Ring Topology, the Token Ring Passing protocol is used by the
workstations to transmit the data.
Figure 4: A ring topology comprises 4 stations connected with each forming a ring.
Token passing: It is a network access method in which a token is passed from one
node to another node.
One station is known as a monitor station which takes all the responsibility for
performing the operations.
To transmit the data, the station has to hold the token. After the transmission
is done, the token is to be released for other stations to use.
When no station is transmitting the data, then the token will circulate in the
ring.
There are two types of token release techniques: Early token release releases
the token just after transmitting the data and Delayed token release releases
the token after the acknowledgment is received from the receiver.
The failure of a single node in the network can cause the entire network to fail.
Troubleshooting is difficult in this topology.
The addition of stations in between or the removal of stations can disturb the
whole topology.
Less secure.
Tree Topology
This topology is the variation of the Star topology. This topology has a hierarchical
flow of data. In Tree Topology, protocols like DHCP and SAC (Standard Automatic
Configuration) are used.
Figure 5: In this, the various secondary hubs are connected to the central hub which
contains the repeater. This data flow from top to bottom i.e. from the central hub to
the secondary and then to the devices or from bottom to top i.e. devices to the
secondary hub and then to the central hub. It is a multi-point connection and a non-
robust topology because if the backbone fails the topology crashes.
Hybrid Topology
This topological technology is the combination of all the various types of topologies
we have studied above. Hybrid Topology is used when the nodes are free to take
any form. It means these can be individuals such as Ring or Star topology or can be
a combination of various types of topologies seen above. Each individual topology
uses the protocol that has been discussed earlier.
Figure 6: The above figure shows the structure of the Hybrid topology. As seen it
contains a combination of all different types of networks.