Computer Network

Download as pdf or txt
Download as pdf or txt
You are on page 1of 68

Computer Network

Asst. Prof. Kalyani Lakhadhir


Computer Network
● Computer networks were first created in the late 1950s for use in the military and
defense.
● Computer network means a set of computer devices are connected in common
network by medium or link.
● In computer network each device capable to send and receive data in uniformly.
● There is common language which all devices can understand for data
transmission. Generally, binary language is used for data transmission in computer
network using digital signals.
● A link connecting device is called communication channel. For example college
computer lab.
How does a computer network work?
● Nodes and links are the basic building blocks in computer networking. A
network node may be data communication equipment (DCE) such as a
modem, hub or, switch, or data terminal equipment (DTE) such as two or
more computers and printers.
● A link refers to the transmission media connecting two nodes. Links may be
physical, like cable wires or optical fibers, or free space used by wireless
networks.
● In a working computer network, nodes follow a set of rules or protocols that
define how to send and receive electronic data via the links.
● The computer network architecture defines the design of these physical and
logical components.
● It provides the specifications for the network’s physical components,
functional organization, protocols, and procedures.
Use of Computer Network
● Online study / research
● File transferring or data sharing
● Email services
● Social media communication
● Teleconferencing and Videoconferencing
● E-commerce / Business
● Online banking etc.
Computer networks have become invaluable to organizations as well as individuals.
Some of its main uses are as follows −
● Information and Resource Sharing − Computer networks allow organizations
having units which are placed apart from each other, to share information in a very
effective manner. Programs and software in any computer can be accessed by other
computers linked to the network. It also allows sharing of hardware equipment, like
printers and scanners among varied users.
● Retrieving Remote Information − Through computer networks, users can retrieve
remote information on a variety of topics. The information is stored in remote
databases to which the user gains access through information systems like the
World Wide Web.
● Speedy Interpersonal Communication − Computer networks have increased the
speed and volume of communication like never before. Electronic Mail (email) is
extensively used for sending texts, documents, images, and videos across the
globe. Online communications have increased by manifold times through social
networking services.
● E-Commerce − Computer networks have paved way for a variety of business and
commercial transactions online, popularly called e-commerce. Users and
organizations can pool funds, buy or sell items, pay bills, manage bank accounts,
pay taxes, transfer funds and handle investments electronically.
● Highly Reliable Systems − Computer networks allow systems to be distributed in
nature, by the virtue of which data is stored in multiple sources. This makes the
system highly reliable. If a failure occurs in one source, then the system will still
continue to function and data will still be available from the other sources.
● Cost–Effective Systems − Computer networks have reduced the cost of
establishment of computer systems in organizations. Previously, it was imperative
for organizations to set up expensive mainframes for computation and storage. With
the advent of networks, it is sufficient to set up interconnected personal computers
(PCs) for the same purpose.
● VoIP − VoIP or Voice over Internet protocol has revolutionized telecommunication
systems. Through this, telephone calls are made digitally using Internet Protocols
instead of the regular analog phone lines.
Network Devices
● Network devices, or networking hardware, are physical devices that are required for communication
and interaction between hardware on a computer network.
● In a computer network, network devices are mainly used for transmitting and receiving the data
quickly and securely in between computers, fax machines, printers, etc.
● When there are a large number of devices in a network, too many data packets get transmitted over
the same network path. This can lead to congestion and degradation in performance.
● The purpose of networking devices is to enable smooth communication between different hardware
connected to a network. Addition of a network device helps in hassle free sharing of network
resources between different systems.

For computer network connection, there are different devices are used:

● Modem
● Router
● Gateway
● Switch
● Bridge
● Hub
● Firewall
Modem
● Modem stands for modulator Demodulator.
● Modem is an internetworking device. It facilitates connection to the internet by
transmitting and receiving data over telephone line.
● Main task of modem is to convert digital signal to analog and analog to digital
signals.
● Using modulation technique it converts digital signal to analog signal. And
de-modulation technique used to convert analog signal to digital signal.
● Modem works on data link layer. It does not provide security.
Router
● A router is a networking device that forwards data packets between computer
networks. Routers perform the traffic directing functions on the Internet. Data
sent through the internet, such as a web page or email, is in the form of data
packets.
● A router is connected to two or more data lines from different IP networks.
When a data packet comes in on one of the lines, the router reads the network
address information in the packet header to determine the ultimate destination.
● Router is a network device that helps to pass data in one or more network. It
connect two or more network but it works only in similar network.
● Main task of router is to identify a rout/path between two network devices.
Router works on network layer. It provide security to protect network.
● It sends data in packet format. It connects multiple PCs in network via Ethernet
cable or WiFi.
● It has a capacity to store routing details so it is both hardware and software
device. Router creates a routing table for storing routing detail.
● There are two types of routing perform y router. [1] Static routing [2] Dynamic
routing.
Gateway

● Router and gateway works on similar terminology but there is vast


difference between router and gateway.
● Gateway also connects one or more networks but it works different
architecture and environment network.
● Gateway can work on broadcast as well as multicast network.
● Gateway is more powerful device than router.
● It acts as the entry – exit point for a network since all traffic that flows
across the networks should pass through the gateway.
Features of Gateway
● Gateway is located at the boundary of a network and manages all data that
inflows or outflows from that network.
● It forms a passage between two different networks operating with different
transmission protocols.
● A gateway operates as a protocol converter, providing compatibility
between the different protocols used in the two different networks.
● The feature that differentiates a gateway from other network devices is that
it can operate at any layer of the OSI model.
● It also stores information about the routing paths of the communicating
networks.
Types of Gateway
Bidirectional Gateways: They permit data to stream in two directions. They can
be utilized as synchronization devices.

Unidirectional Gateways: They permit data to stream just a single direction.


Changes made in the source node are duplicated in the destination node,
however not the other way around. They can be utilized as archiving devices.
Switch
● Switch is also a network device which work in internet. it is used to connect one
or more device in same network.
● A network switch (also called switching hub, bridging hub and by the IEEE, MAC
bridge) is networking hardware that connects devices on a computer network by
using packet switching to receive and forward data to the destination device.
● A network switch is a multiport network bridge that uses MAC addresses to
forward data at the data link layer (layer 2) of the OSI model. Some switches can
also forward data at the network layer (layer 3) by additionally incorporating
routing functionality. Such switches are commonly known as layer-3 switches or
multilayer switches.
● Switch manages data transmission using star topology. It is full-duplex device.
● Switch works on store and forward technique.
● Switch store Mac address of connected device and identify that address at the
time of sending and receiving frames.
● Switch work on data link layer. And it is more powerful than Hub less powerful
than router.
Hub
● Hubs are networking devices operating at a physical layer of the OSI model
that are used to connect multiple devices in a network. They are generally
used to connect computers in a LAN.
● A hub has many ports in it. A computer which intends to be connected to the
network is plugged in to one of these ports.
● When a data frame arrives at a port, it is broadcast to every other port,
without considering whether it is destined for a particular destination device or
not.
● A hub operates in the physical layer of the OSI model.
● A hub cannot filter data. It is a non-intelligent network device that sends
message to all ports.
Types of HUB
Passive Hubs − Passive hubs connects nodes in a star configuration by collecting
wiring from nodes. They broadcast signals onto the network without amplifying or
regenerating them. As they cannot extend the distance between nodes, they limit
the size of the LAN.

Active Hubs − Active hubs amplify and regenerate the incoming electrical signals
before broadcasting them. They have their own power supply and serves both as a
repeater as well as connecting centre. Due to their regenerating capabilities, they
can extend the maximum distance between nodes, thus increasing the size of LAN.

Intelligent Hubs − Intelligent hubs are active hubs that provide additional network
management facilities. They can perform a variety of functions of more intelligent
network devices like network management, switching, providing flexible data rates
etc.
Bridge
● Bridge is device which use to divide large network in to small network.
● Bridge also sends frames from device to device. It control traffic in network.
● A network bridge is a device that divides a network into segments. Each
segment represent a separate collision domain, so the number of collisions on
the network is reduced. Also, because each collision domain has its own
separate bandwidth, a bridge also improves the overall network performance.
● If the bridge determines that the destination host is on another segment of the
network, it forwards the frame to that segment.
● Bridge works on physical layer and data link layer. Bridge also helps device to
identify their packet.
● It also performs a role of repeater. Bridge regenerates signals and forward
new copy of signal to device whose address is match.
● Bridge basically works in a bus topology. The bridge is used to reduce
network traffic.
Firewall
● A firewall is a network security device that monitors incoming and outgoing
network traffic and permits or blocks data packets based on a set of security
rules. Its purpose is to establish a barrier between your internal network and
incoming traffic from external sources (such as the internet) in order to block
malicious traffic like viruses and hackers.
● A firewall is used to protect more secure network from a less secure network.
Generally, firewalls are used to protect your internal/private LAN from the
Internet.
● A firewall generally works at layer 3 and 4 of the OSI model. Layer 3 is the
Network Layer where IP works and Layer 4 is the Transport Layer, where
TCP and UDP function. Many firewalls today have advanced up the OSI
layers and can even understand Layer 7 – the Application Layer.
How Firewall Works?
● Firewalls carefully analyze incoming traffic based on pre-established rules and filter
traffic coming from unsecured or suspicious sources to prevent attacks.
● Firewalls guard traffic at a computer’s entry point, called ports, which is where
information is exchanged with external devices. a firewall’s safety comes from
monitoring and regulating traffic that goes in and out of your network. This is
accomplished using a few different methods, including packet filtering, a proxy
service, and stateful inspection.
● Firewalls can be either hardware or software, and they form a wall between your
network and the internet or between segments of your network and the rest of your
system.
● Not only do firewalls keep malicious code out of your network, but some, because
they can examine data both as it comes in and goes out, can also prevent an
attacker from using your system to spread harmful code.
● Firewall filters keep harmful data outside your computer. Some of the top risks from
which firewalls protect your computer include attacks, remote logins, spam, and
viruses.
Network Types
● A computer networks is an interconnected system of devices, represented as
network nodes, that share information, data and resources among each other.
● Larger networks use devices like routers and switches to create the
underlying network infrastructure.
● Not all the networks are same. Each network type is different by its size,
distance it covers and physical architecture. Some computer networks are
wired and wireless.
● A network can be build with a small handful of device within a single room to
millions of devices spread across the entire world.
Generally, we all know categories of network,
● Local Area Network(LAN)
● Metropolitan Area Network(MAN)
● Wide Area Network(WAN)
● Personal Area Network(PAN) etc.
LAN (Local Area Network)
● A local area network (LAN) is a computer network that interconnects computers within a
limited area such as a residence, school, laboratory, university campus or office building.
● LAN usually private/owned network. It established network in single building or campus
up to a few kilometres.
● LAN can span up to 1 meter to 100 meter but now a days LAN can span up to kilometer.
● LAN is widely used to connect personal computer and workstation in company, college to
share resources and exchange data.
● LANs use both wired and wireless connectivity options. Wireless LAN (WLAN) has
surpassed traditional wired LAN in terms of popularity, but wired LAN remains the more
secure and reliable option.
● Wired LANs use physical cables, like Ethernet, twisted pair, coaxial cable and switches;
WLANs use devices, like wireless routers and access points, to interconnect network
devices through radio frequency waves.
● Most common LAN Topology is Bus, Ring and Star.
● Traditional LAN Data Rate is 4 to 6 Mbps. Todays speed is increasing and data rate is up
to 100 Mbps.
● It is less costly as it is built with inexpensive hardware such as hubs, network adapters,
and ethernet cables.
● The data is transferred at an extremely faster rate in Local Area Network. And it provides
higher security.
The distinguishing features of LAN are
● Network size is limited to a small geographical area, presently to a few
kilometers.
● Data transfer rate is generally high. They range from 100 Mbps to 1000 Mbps.
● In general, a LAN uses only one type of transmission medium, commonly
category 5 coaxial cables.
● A LAN is distinguished from other networks by their topologies. The common
topologies are bus, ring, mesh, and star.
● The number of computers connected to a LAN is usually restricted. In other
words, LANs are limitedly scalable.
● Originally, coaxial cables were used for communications. But now twisted pair
cables and fiber optic cables are also used.
LAN Diagram
MAN(Metropolitan Area Network)
● A metropolitan area network (MAN) is a computer network that connects computers within a
metropolitan area, which could be a single large city, multiple cities and towns, or any given
large area with multiple buildings.
● The term is also used to describe the interconnection of several local area networks in a
metropolitan area through the use of point-to-point connections between them .
● It is designed to extend over an entire city or town. MAN can connect large network through
fiber optic or coaxial cable now a days it can be connected wireless.
● MANs typically combine the networks of multiple organizations, instead of being managed
by a single organization.
● A MAN is larger than a local area network (LAN) but smaller than a wide area network
(WAN). MAN is made up of interconnected LANs.
● Like WANs, a MAN is made up of interconnected LANs. Because MANs are smaller, they
are usually more efficient than WANs, since data does not have to travel over large
distances.
● MANs typically combine the networks of multiple organizations, instead of being managed
by a single organization.
● Most MANs use fiber optic cables to form connections between LANs. Often a MAN will run
on "dark fiber" — formerly unused fiber optic cables that are able to carry traffic.
Where is MAN Used?
● Digital cable television
● Government agencies use it
● Campuses of universities
● Broadband through cable
● Previously, it was used to link the many branches of the local school.
● While in the hospital (for communication between doctors, research offices,
labs)
● A system of fire stations
● Traveling through airports
● Community college collaboration around the country
● Public libraries use it
Metropolitan area network advantages and
disadvantages
● The primary advantage of a MAN over a WAN is the high bandwidth enabled
by the dedicated links of a metropolitan area network. This application of a
MAN provides higher speed, from 1 gigabit per second to 100 Gbps, and
lower latency than would be possible over a WAN. Since the organization
maintains control of the connection, it can apply traffic shaping and increased
security.
● Disadvantages of a MAN over a WAN include potentially higher costs, greater
complexity and additional logistics required to maintain the links. A
well-designed MAN will also have redundant connections, requiring at least
two connections per building.
WAN(Wide Area Network)

● A wide area network (also known as WAN), is a large network of information


that is not tied to a single location.
● WAN spans a large geographical area. It often connected with country and
continent. It provide long distance transmission of data.
● WANs can be vital for international businesses, but they are also essential for
everyday use, as the internet is considered the largest WAN in the world.
● Communication in WAN is done by telephone, satellite dishes and Radio
waves. Every MAN and LAN is connected with WAN.
● WAN is a computer network spanning regions, countries, or even the world.
● WAN networks are much more expensive than home or corporate intranets.
What Is the Purpose of a WAN Connection?
● If WAN connections didn’t exist, organizations would be isolated to restricted
areas or specific geographic regions.
● LANs would allow organizations to work within their building, but growth to
outside areas — either different cities or even different countries — would not
be possible because the associated infrastructure would be cost prohibitive
for most organizations.
● As organizations grow and become international, WANs allow them to
communicate between branches, share information and stay connected.
● When employees travel for work, WANs allow them to access the information
they need to do their job.
● However, WANs also provide an essential service to the public. Students at
universities might rely on WANs to access library databases or university
research. And every day, people rely on WANs to communicate, bank, shop
and more.
Examples of WAN

● The Internet
● 4G Mobile Broadband Systems
● A network of bank cash dispensers.(a machine that people use to get money from their
bank accounts by using a special card.)
● LANs are often connected to WANs, for example, a school network could be
connected to the Internet.
● WANs can be connected together using the Internet, leased lines or satellite links.
The distinguishing features of WAN are:
● WANs have a large capacity, connecting a large number of computers over a
large area, and are inherently scalable.
● They facilitate the sharing of regional resources.
● They provide uplinks for connecting LANs and MANs to the Internet.
● Communication links are provided by public carriers like telephone networks,
network providers, cable systems, satellites etc.
● Typically, they have low data transfer rate and high propagation delay, i.e.they
have low communication speed.
Network Topologies

Asst. Prof. Kalyani Lakhadhir


Network Topologies
What is Topology?
Network topology is the physical and logical arrangement of nodes and
connections in a network. It describe the arrangement of networks and the
relative location of traffic flows.
● Topology defines the structure of the network of how all the components are
interconnected to each other. OR A Network Topology is the arrangement with
which computer systems or network devices are connected to each other.
● Administrators can use network topology diagrams to determine the best
placements for each node and the optimal path for traffic flow. An organization
can more easily locate faults and fix issues, improving its data transfer
efficiency.
● The type of network topology differs depending on how the network needs to
be arranged.
Why Network Topology is Important?
● Network topology plays a major role in how a network functions. Namely, the
topology has a direct effect on network functionality. Choosing the right
topology can help increase performance, as a properly chosen and
maintained network topology increases energy efficiency and data transfer
rates.
● A well-defined network topology makes it easier for network admins to locate
faults, troubleshoot issues and to allocate network resources. Diagrams are
an important reference point in helping to diagnose network issues, as they
can represent physical and logical layouts.
What are the types of network topologies?
● Network topologies are categorized as either a physical network topology or logical
network topology. The physical topology of a network is the physical layout of nodes
and connections.
● Connections include the lines in diagrams that connect nodes, such as Ethernet or
Digital Subscriber Line wires, fiber optics and microwaves.
● Logical network topologies define how a network is set up, including which nodes
connect and how, as well as the pattern of data transfers.
● So, There are several types of topologies:
1. Bus Topology
2. Star Topology
3. Ring Topology
4. Mesh Topology
5. Tree Topology
6. Hybrid Topology
Bus Topology
● Bus Topology is the simplest of the network topologies.
● In this type of topology, all the nodes are connected to the single cable called bus.
● Nodes are connected to the bus by the help of Drop lines or Tap.
● This central cable is the backbone of the network and is known as Bus.
● Every workstation communicates with the other device through this Bus.
● A signal from the source is broadcasted and it travels to all workstation connected to Bus cable.
● Although the message is broadcasted but only the intended recipient, whose MAC address or IP
address matches accepts it.
● If the MAC / IP address of machine doesn’t match with the intended address machine discards the
signal.
● A terminator is added at ends of the central cable, to prevent bouncing of signals.
● Bus topology may have problem while multiple hosts sending data at the same time.
● Therefore, Bus topology either uses CSMA/CD technology or recognizes one host as Bus Master to
solve the issue.
● It is one of the simple forms of networking where a failure of a device does not affect the other
devices. But failure of the shared communication line can make all other devices stop functioning.
● The data is sent in only one direction and as soon as it reaches the extreme end, the terminator
removes the data from the line.
Advantages of Bus Topology
● Easy to connect a computer
● Easy to implement and extend
● Suitable for small network
● It is flexible and scalable
● It is very simple and easy to install
● Require less cable length than a star topology
● It is less expensive
● If one node fails, other nodes are not to be affected
● When a node added or removed to and from the network, the network is not
affected
● Typically to cheapest topology to implement
Disadvantages of Bus Topology
● Entire network fail is there any problem in a central cable
● Difficult to administrator and troubleshoot
● Limited cable length and number of station
● Performance degrades as additional computers are added
● Maintenance cost may be much higher in the long run
● A cable break can disable the entire network, and there is no redundancy
● Every workstation all the data on the network (security issues)
● One virus in the network will affect all of the systems
● If many computers are attached, the amount of data flowing causes the
network to suddenly slow down
● Proper termination is required
● The efficiency of the bus network reduces, at that time as the number of
devices connected to it increases
● Data traffic is high
● Data collision is high
Star Topology
● Star topology is an arrangement of the network in which every node is
connected to the central hub, switch or a central computer.
● The central computer is known as a server, and the peripheral devices
attached to the server are known as clients.
● Coaxial cable or RJ45 cables are used to connect the computers.
● Star topology is the most popular topology in network implementation.
● The devices are not directly connected to each other like Mesh Topology.
● Star topology not allow direct traffic between devices.
● If one computer want to send data to another it must has to send data to the
hub or controller, which then relay the data to the other connected device.
● Each device has a dedicated point-to-point link only to a central controller,
usually called a hub.
● Performance of the network is dependent on the capacity of the central hub.
Advantages of Star Topology
● It is a good opinion for modern network
● It is easy to manage
● Offer the opportunity for expansion
● More scalable than a peer to peer network or ring network
● Easy to add a new station
● Easy to install and wiring
● Low network traffic
● Improve network performance
● Easy to monitor and troubleshoot
● Can accommodate different wiring
● It is easy to modify and also have to add a new computer in a star network device
● Less cabling is needed then mesh topology
● During adding or deleting a node network can function normally act
● Less expensive than mesh topology
● Easy to fault identification and to remove parts
● Only one single computer failure does not necessarily bring down the whole star network
● Installation and configuration are easy
● Robustness
● No disruption to the network when connecting or removing part
● Provide for centralized monitoring and management of the network
● The alternative is there to change the port
● Most popular topology in use, a wide variety of equipment available
Disadvantages of Star Topology
● It's created for a single point for failure
● There is no route redundancy
● More cable required
● More expensive
● If hub fails the whole system will fail
● Cable installation more difficult
● Extra hardware required
Ring Topology
● In ring topology, each host machine connects to exactly two other machines, creating a circular
network structure.
● When one host tries to communicate or send message to a host which is not adjacent to it, the data
travels through all intermediate hosts.
● To connect one more host in the existing structure, the administrator may need only one more extra
cable.
● Failure of any host results in failure of the whole ring.Thus, every connection in the ring is a point of
failure.
● As compared to the bus topology, a ring topology is highly efficient and can handle heavier loads.
● Generally, Bidirectional and Unidirectional are the two types of ring topology. On the basis of devices
that are being linked together to form a network.
● RJ-45 network cable or a coaxial cable is used to connect computers in a ring topology
● A ring architecture has the drawback that if one node fails to send data, the entire network suffers.
● Therefore, some of the ring topology setups use a dual-ring structure to resolve this problem. In a
dual-ring structure, the information is transmitted into clockwise and anti-clockwise directions.
● There is a backup way of transmission in case one transmission fails; these systems are known as
redundant ring structures.
How Does Ring Topology work?
● Empty tokens are freely distributed over the ring. The speed of the ring goes from 16
Mbps to 100 Mbps.
● To store data frames and transmit, the empty token contains placeholders and also
holds sender or receiver addresses.
● When a sending node has to send a message, it acquires a token and fills it with
data, obtaining the receiving nodes MAC address and its own ID in the token. In the
ring, a filled token is sent to the next node.
● The token is received by the next node and determines if it is meant for transmitting.
Then, the data is copied into the node from the frame and set the token to zero, and
transferred to the next node.
● Until the data reaches the right destination, the above step is repeated.
● When the sender receives the token, it will initialize the message if it finds the
receiver has read the data.
● It is beneficial in transmitting data; the token is to be consumed and recirculated any
by any of the nodes.
● If contact is lost, a node is idle, and the network supports a dual ring, data is
delivered in the opposite direction to the destination.
Advantages of Ring topology
● In this data flows in one direction which reduces the chance of packet
collisions.
● In this topology additional workstations can be added after without impacting
performance of the network.
● Equal access to the resources.
● There is no need of server to control the connectivity among the nodes in the
topology.
● It is cheap to install and expand.
● Minimum collision.
● Speed to transfer the data is very high in this type of topology.
● Due to the presence of token passing the performance of ring topology
becomes better than bus topology under heavy traffic.
● Easy to manage.
● Ring network is extremely orderly organized where every device has access
to the token and therefore the opportunity to transmit.
Disadvantages of Ring Topology
● Due to the Unidirectional Ring, a data packet (token) must have to pass
through all the nodes.
● If one workstation shuts down, it affects whole network or if a node goes down
entire network goes down.
● It is slower in performance as compared to the bus topology
● It is Expensive.
● Addition and removal of any node during a network is difficult and may cause
issue in network activity.
● Difficult to troubleshoot the ring.
● In order for all the computer to communicate with each other, all computer
must be turned on.
● Total dependence in on one cable.
● They were not Scalable.
Mesh Topology
● A mesh topology is a network setup where each computer and network device
is interconnected with one another.
● It is a topology commonly used for wireless networks. Below is a visual
example of a simple computer setup on a network using a mesh topology.
● The connected nodes can be computers, switches, hubs, or any other
devices.
● In this topology setup, even if one of the connections goes down, it allows
other nodes to be distributed.
● This type of topology is very expensive and does not have any hierarchy,
interdependency, and uniform pattern between nodes.
● The connections of the mesh topology are not easier to establish.
● All computers, in a mesh topology, not only responsible for sending their own
signals but also relays for other nodes.
● Also, there is a point-to-point connection between all nodes in the mesh
topology setup. The below picture is an instance of a mesh topology network.
How does Mesh Topology Works?
The mesh topology functions on two principles: Routing and flooding.

Routing:

In the routing mode, before delivering data packets to the destination, the data is
communicated in a prearranged path containing many hopping across nodes. All
the intermediate nodes require to active and remain connected in order to transmit
the data over the network.

Flooding:

In the Flooding model, in the network, the data is transmitted to every active
nodes. The addressed data is consumed by a node otherwise, if it finds that the
data is not addressed, it passes it to the next node.
Advantages of Mesh Topology
● Failure during a single device won’t break the network.
● There is no traffic problem as there is a dedicated point to point links for every
computer.
● Fault identification is straightforward.
● This topology provides multiple paths to succeed in the destination and tons
of redundancy.
● It provides high privacy and security.
● Data transmission is more consistent because failure doesn’t disrupt its
processes.
● Adding new devices won’t disrupt data transmissions.
● This topology has robust features to beat any situation.
● A mesh doesn’t have a centralized authority.
Disadvantages of Mesh Topology
● It’s costly as compared to the opposite network topologies i.e. star, bus, point
to point topology.
● Installation is extremely difficult in the mesh.
● Power requirement is higher as all the nodes will need to remain active all the
time and share the load.
● Complex process.
● The cost to implement mesh is above other selections.
● There is a high risk of redundant connections.
● Each node requires a further utility cost to think about.
● Maintenance needs are challenging with a mesh.
Tree Topology
● A tree topology is a special type of structure where many connected elements are arranged like the
branches of a tree.
● A tree topology is also known as a star bus topology. It incorporates elements of both a bus topology
and a star topology.
● if the main cable (trunk) between the two star topology networks failed, those networks would be
unable to communicate with each other. computers on the same star topology would still be able to
communicate.
● In a tree topology, any two linked nodes can only have one mutual connection, hence there can only
be one link between them.
● If you have small sub-departments or departments and, this topology is very useful.

There are several ways to define tree topology; such are as follows:

● A tree topology combines several star topologies by connecting several components to the centre
node.
● It may define by experts as tree topology is a combination of bus and star topologies in which all
nodes are attached with the help of a single central node.
● Every node in this architecture is connected one to one in a hierarchy level, with each neighbouring
node on its lower level. Each secondary node has a point-to-point link to the parent node, and all
secondary nodes under its jurisdiction have point-to-point connections to the tertiary nodes. When
examined in a visual sense, these systems resemble a tree structure.
How Tree Topology Network Works?
● if the server wants to establish a connection to Node I, it will digest or
encapsulate the destination address and data
● Then, it will transmit the signal to Backbone Cable after completing the
encapsulation process.
● The encapsulated package will start to pass on both sides of branches of the
Bus Backbone Network.
● There are three types of Hub that can be used in the Three Topology
Network, which are Intelligent Hub, Active Hub, and Passive Hub.

Applications of Tree Topology

One of the most common applications of a tree topology is in computer


networks. Tree topology is often used to connect multiple devices, such as
printers and computers, in a home or small office. This topology is mostly
used on larger networks.
Advantages of Tree Topology
● It is a combination of bus and star topology
● It provides high scalability, as leaf nodes can add more nodes in the
hierarchical chain.
● Other nodes in a network are not affected, if one of their nodes get damaged
● It provides easy maintenance and fault identification.
● Supported by several hardware and software vendors.
● Point-to-point wiring for individual segments.
● Error detection and correction is easy
● We can the whole network into a segment, which can be easily managed and
maintained
● If one segment is damaged other segment are not be affected
● It is the best topology because the signals that are transmitted by the root
nodes are received by all the computers at the same time.
Disadvantages of Tree Topology
● This topology is more difficult to configure and wire than other types of
topologies
● In this topology, relies heavily on the main bus cable, if it breaks the whole
network is crippled
● It requires more cabling
● If the backbone link break, the entire segment totally goes down
● As more and more nodes and segment are needed, the maintenance
becomes difficult
● The overall length of each segment is limited by the types of cabling used
● Scalability of the network depends on the which types of cable used
● Heavily traffics cause the network and make it too slow
Hybrid Topology
● A hybrid topology is a kind of network topology that is a combination of two or
more network topologies, such as mesh topology, bus topology, and ring
topology.
● Its usage and choice are dependent on its deployments and requirements
like the performance of the desired network, and the number of computers,
their location.
● a variety of technologies are needed for its physical implementation, and it
offers a complex structure.
● Also, it includes an advantage as increasing flexibility; it can increase fault
tolerance, and allows new basic topologies to be added or removed easily.
● The hybrid topology is more useful when you need to fulfill diversity in
Computer Network. In this topology, all network sections can include the
configuration of different Network Topology.
Why Do We Use the Hybrid Topology?
● Due to effective cost, there are different applications that use hybrid topology. As
compared to other fundamental mechanisms, the mechanism of hybrid topology is
efficient; it can also be deployed in different environments.
● Thus, it provides users the benefit to create, run and manage the organization.
● There are various sectors where the hybrid topology is widely used, such as many
educational institutions, banking sector, automated industries, financial sector, research
organizations, ad multinational companies.
● For creating the structure of the new hybrid topology, there is a need to mix any two
topologies like full mesh topology, extended star, partial star, point to point networks is
used.
● The examples and applications of hybrid topology are increasing rapidly. It has a
super-power set up and flexible option and declared as a smart option; hence, the people
choose to deploy it in-home or office.
● A compact is provided for the small-scale industries by this topology, as well as to their
subunits.
● Thus, it is good to use for multi-floor buildings and departments such as an office or home.
● This topology is placed to give its maximum efficiency on the basis of the requirements as
it provides many benefits.
Advantages of hybrid topology
Strong network: If any computer in the network fails to function then other computers in the
network will not be affected.

Scalable: This type of network can be expanded without any problem. You just need an
additional hub to connect the new topology to the existing network of topology.

Effective: End users can share their files from one office to another and the speed of data is also
high in the network.

Combined features: When you connect two or more topologies then the resulting topology will
get benefits from all the combined topologies.

Flexible: You can add and remove nodes from the network easily without any issue.

Reliable: if there occurs any error in the network then the error can be identified and fixes easily.

Large traffic: This topology can handle a large amount of data traffic. You will not face any traffic
issue if you expand or collapse the network. You can make a large network easily.
Disadvantages of hybrid topology
Complex: As there are two or more topologies connected so the number of nodes
increases also. This will make the network very large and handling all the issues in
the nodes become difficult.

Costly: To connect different network topologies there is needed a special hub


that can understand all the complexity of the different topologies. This type of
special hub is costly.

A lot of cables: As the network grows, the number of cables required to connect
also increases. It becomes difficult for a network technician to handle all the
cables together.

You might also like