Networks
Networks
Networks
A mesh topology is a type of network arrangement where all computers and network
devices are connected to each other. Even if one of the connections fails, most
communications can still be distributed using this architecture. This is a topology that
wireless networks use all the time. The primary purpose of a mesh topology is to provide
robustness, fault tolerance, and flexibility in network communication. There are two types of
this topology, full mesh and partially-connected mesh. In a full topology, each node is
connected to every other node directly, as the name would imply. This makes it possible to
send a message via numerous different paths. However, not every node in a partially-
connected mesh is connected to every other node directly. As a result, a partially-connected
mesh is an inexpensive and easier way to implement but offers fewer paths for a message to
travel than a full mesh. Additionally, the network as a whole keeps functioning normally even
in the event that one of its main computers or connections fails.
816035815
816035815
816035815
816035815
deliberately to maximize performance and coverage, and the network can adjust to
requirements or changes in topology.
Moreover, as well as there are advantages, there are also disadvantages. Some
disadvantages of mesh topology are, Complexity, Cost, Resource Consumption, Maintenance
and Limited Scalability in Fully Connected Mesh. Complexity, the design, implementation,
and management of mesh topologies can be challenging, particularly in large-scale networks
with many of nodes and connections. An excessive number of links may cause routing and
setup to become more difficult. Secondly, cost, it can be very expensive to implement a mesh
topology network, especially when it comes to infrastructure and equipment. A substantial
investment in hardware and cabling may be necessary to support numerous connections and
redundant links. Thirdly, resource consumption, networks with mesh topologies use more
bandwidth and processing power than networks with other topologies. Performance issues
with a network might arise from the overhead of keeping multiple connections and routing
methods. Next, we have maintenance, it takes cautious administration and observation to
maintain a mesh topology network and guarantee optimal performance. It can take a lot of
effort and time to troubleshoot connectivity problems and optimize routing patterns. Finally,
limited scalability in fully connected mesh, the scalability of mesh topology is maintained,
but as the number of nodes rises, fully connected mesh networks become unattainable. The
complexity and scalability issues arise from the exponential growth of connections with each
new node.
Additionally, technology networks or servers all require some sort of security
procedure to stay safe. Pankracij (2020) mentions locking your server room, physically lock
the actual servers in the server room, deploy proper exit procedures for employees with
secured access and invest in a quality video surveillance system are all methods to protecting
your networks. Firstly, making sure the server room door has enough physical or electronic
locks and that they are being used should be your first line of protection. Ultimately, your
organization's lifeblood is represented by your servers. Establish a policy requiring the server
room door to be secured whenever it is vacant and granting access to only authorized
individuals with a key or code. Secondly, to further protect your servers, make an investment
in floor-mount racks or cages or lockable wall-mount server cabinets that can be bolted
straight to the wall or floor. This will make it almost impossible for someone to hijack your
servers. Another method is where an employee departs your firm, be sure there are processes
in place to modify and deactivate their login credentials. As necessary, ensure that external
providers are informed of these procedures. Lastly, invest in a high-quality surveillance
system with round-the-clock monitoring to stop people with access to your server room from
accidently or intentionally tampering with hard drives or server information. With the most
recent technology developments, peace of mind is comparatively inexpensive. Investing in a
system that surveys and keeps an eye on all important entry points into your building is a
pretty excellent idea, especially the front lobby area and any side or rear entries.
In conclusion, after thorough research, we learnt what is a network, what is a network
topology, types of network topologies, identified the recommend topology that is best
suitable to connect St. Augustine, Mount Hope and Debe campuses that can achieve 99.9%
uptime, with the result being the Mesh topology. Following with what is a mesh topology,
816035815
816035815
types of mesh topology and what each type is and the advantages and disadvantages of a
mesh topology. Finally, a few methods to safely secure your servers or networks was briefly
explained.
References
Consultancy, N. (2022). Understanding Mesh Networking: What is it and Why its important.
Medium.
GeeksforGeeks. (2022). Advantages and Disadvantages of Mesh Topology.
Hope, C. (2018). Mesh topology.
Javapoint. (2021). Network Topology.
Lyntia. (2021). Network Connectivity: the Ultimate Guide with Everything You Need to
Know.
Milan. (2023). Network Technology: Definition, Examples, Evolution, Impact, etc. Tech
Quintal.
P., B. (2023). Network Topology. TechTerms.
Pankracij, B. (2020). Seven Security Tips to Protect Your Server Room! Security Specialists.
816035815