Network Topology
Network Topology
Point-to-Point
If the hosts are connected point-to-point logically, then may have multiple
intermediate devices. But the end hosts are unaware of underlying network and see each
other as if they are connected directly.
Types of Topology
1. Bus Topology
In case of Bus topology, all devices share single communication line or cable. Bus
topology may have problem while multiple hosts sending data at the same time. Therefore,
Bus topology either uses CSMA/CD technology or recognizes one host as Bus Master to
solve the issue. It is one of the simple forms of networking where a failure of a device does
not affect the other devices. But failure of the shared communication line can make all other
devices stop functioning.
Uses a trunk or backbone to which all of the computers on the network connect.
Systems connect to this backbone using T connectors or taps.
Coaxial cablings ( 10Base-2, 10Base5) were popular options years ago.
Both ends of the shared channel have line terminator. The data is sent in only one
direction and as soon as it reaches the extreme end, the terminator removes the data from the
line.
2. Star Topology
All hosts in Star topology are connected to a central device, known as hub device, using a
point-to-point connection. That is, there exists a point to point connection between hosts and
hub. The hub device can be any of the following:
• All computers/devices connect to a central device called hub or switch.
• Each device requires a single cable
• point-to-point connection between the device and hub.
• Most widely implemented
• Hub is the single point of failure
3. Ring Topology
In ring topology, each host machine connects to exactly two other machines, creating
a circular network structure. When one host tries to communicate or send message to a host
which is not adjacent to it, the data travels through all intermediate hosts. To connect one
more host in the existing structure, the administrator may need only one more extra cable.
• Logical ring
– Meaning that data travels in circular fashion from one computer to another on the
network.
– Typically FDDI, SONET or Token Ring technology are used to implement a ring
network
– Ring networks are most commonly wired in a star configuration
• Token Ring has multi-station access unit (MSAU),equivalent to hub or switch.
MSAU performs the token circulation internally
Failure of any host results in failure of the whole ring. Thus, every connection in the
ring is a point of failure. There are methods which employ one more backup ring.
4. Mesh Topology
In this type of topology, a host is connected to one or multiple hosts. This topology
has hosts in point-to-point connection with every other host or may also have hosts which
are in point-to-point connection to few hosts only.
• Each computer connects to every other.
• High level of redundancy.
• Rarely used.
– Wiring is very complicated
– Cabling cost is high
– Troubleshooting a failed cable is tricky
– A variation hybrid mesh
– create point to point connection between specific network devices, often seen in
WAN implementation.
Hosts in Mesh topology also work as relay for other hosts which do not have direct point-
to-point links. Mesh technology comes into two types:
Full Mesh: All hosts have a point-to-point connection to every other host in the
network. Thus for every new host n(n-1)/2 connections are required. It provides the
most reliable network structure among all network topologies.
Partially Mesh: Not all hosts have point-to-point connection to every other host.
Hosts connect to each other in some arbitrarily fashion. This topology exists where we
need to provide reliability to some hosts out of all.
5. Tree Topology
Also known as Hierarchical Topology, this is the most common form of network
topology in use presently. This topology imitates as extended Star topology and inherits
properties of bus topology.
This topology divides the network in to multiple levels/layers of network. Mainly in
LANs, a network is bifurcated into three types of network devices. The lowermost is access-
layer where computers are attached. The middle layer is known as distribution layer, which
works as mediator between upper layer and lower layer. The highest layer is known as core
layer, and is central point of the network, i.e. root of the tree from which all nodes fork.
All neigh boring hosts have point-to-point connection between them. Similar to the
Bus topology, if the root goes down, then the entire network suffers even. though it is not the
single point of failure. Every connection serves as point of failure, failing of which divides
the network into unreachable segment.
Daisy Chain
This topology connects all the hosts in a linear fashion. Similar to Ring topology, all
hosts are connected to two hosts only, except the end hosts. Means, if the end hosts in daisy
chain are connected then it represents Ring topology.
Each link in daisy chain topology represents single point of failure. Every link failure
splits the network into two segments. Every intermediate host works as relay for its
immediate hosts.
6. Hybrid Topology
A network structure whose design contains more than one topology is said to be
hybrid topology. Hybrid topology inherits merits and demerits of all the incorporating
topologies.
of
Functions
•devices
network
expanding
or
networks
(connecting)
Separating
switches
routers,
bridges,
hubs,
repeaters,
e.g.
network
The above picture represents an arbitrarily hybrid topology. The combining
topologies may contain attributes of Star, Ring, Bus, and Daisy-chain topologies. Most
•
WANs are connected by means of Dual-Ring topology and networks connected to them are
mostly Star topology networks. Internet is the best example of largest Hybrid topology.
Network Devices
More than two computers connected using a networking device.
of
Functions
•devices
•
network
expanding
or
networks
(connecting)
Separating
switches
routers,
bridges,
hubs,
repeaters,
e.g.
network
Functions of network devices
•Separating (connecting) networks or expanding network
•e.g. repeaters, hubs, bridges, routers, switches
connecting
devices
Five
6.1
Repeaters
Hubs
Bridges
Switches
Routers
Six connecting devices
1. Repeaters
2. Hubs
3. Bridges
4. Switches
5. Routers
6. Gateway
3.Bridges
Acts on the data link layer (MAC address level)
Used to divide (segment) the LAN into smaller LANs segments, or to connect LANs
that use identical physical and data link layers protocol
Each LAN segment is a separate collision domain Bridge does not send the
received frame to all other interfaces like hubs and repeaters, but it performs filtering
A bridge has a table used in filtering decisions.
Types of Switches
Switches can use different forwarding techniques—two of these are store-and-
forward switching and cut-through switching.
In store-and-forward switching, an entire frame must be received before it is
forwarded.
Cut-through switching allows the switch to begin forwarding the frame when enough
of the frame is received to make a forwarding decision. This reduces the latency
through the switch.
Store-and-forward switching gives the switch the opportunity to evaluate the frame
for errors before forwarding it.
Cut-through switching does not offer this advantage, so the switch might forward
frames containing errors.
5. Routers
Modems
• Connect to ISP
• Dialing up to a LAN
• Internal add-in expansion cards or external devices connect to serial or USB port –
PCMCIA cards for laptop
• Speed
– Modem itself