Network Topologies
Network Topologies
Topology defines the structure of the network of how all the components are interconnected to
each other. There are two types of topology: physical and logical topology.
Physical topology refers to the actual physical arrangement of devices (computers, routers,
switches, etc.) and cables (or wireless connections) in a network while logical topology refers to
how data flows within the network. Logical topology focuses on how devices communicate and
how data is transmitted, routed, or managed within the network.
1) Bus Topology
o The bus topology is designed in such a way that all the stations are connected through a
single cable known as a backbone cable and terminators at the end of the bus. The work
of terminators is to prevent the over flow of signals.
o Each node is ei
o When a node wants to send a message over the network, it puts a message over the
network. All the stations available in the network will receive the message whether it has
been addressed or not.
o The configuration of a bus topology is quite simpler as compared to other topologies.
o The backbone cable is considered as a "single lane" through which the message is
broadcast to all the stations.
o The most common access method of the bus topologies is CSMA (Carrier Sense Multiple
Access).
CSMA: It is a media access control used to control the data flow so that data integrity is
maintained, i.e., the packets do not get lost. There are two alternative ways of handling the
problems that occur when two nodes send the messages simultaneously.
Page 1 of 8
CSMA CD: CSMA CD (Collision detection) is an access method used to detect the
collision. Once the collision is detected, the sender will stop transmitting the data.
Therefore, it works on "recovery after the collision".
CSMA CA: CSMA CA (Collision Avoidance) is an access method used to avoid the
collision by checking whether the transmission media is busy or not. If busy, then the
sender waits until the media becomes idle. This technique effectively reduces the
possibility of the collision. It does not work on "recovery after the collision".
2) Ring Topology
In Ring topology devices are connected to each other to form a ring. The node that receives the
message from the previous computer will retransmit to the next node. The data flows in one
direction, i.e., it is clockwise unidirectional.
The most common access method of the ring topology is token passing.
o Token passing: It is a network access method in which token is passed from one node to
another node.
o Token: It is a frame that circulates around the network.
Page 2 of 8
Advantages of Ring topology:
Ring networks are moderately easy to install
Orderly Data Flow: Data travels in a single direction, reducing the chances of packet
collisions.
Equal Access: Every device gets equal opportunity to transmit, which avoids congestion
and ensures predictable performance.
Easy to Identify Issues: Faults in the network are easier to locate since data flows
through each device in a fixed path.
No Central Dependency
Unlike star topology, the network doesn’t rely on a central hub or switch—so there's no
single point of failure from a central device.
3) Star Topology
Star topology is an arrangement of the network in which every node is connected to the
central hub, switch or a central computer.
The central computer is known as a server, and the peripheral devices attached to the
server are known as clients.
Star topology is the most popular topology in network implementation.
Page 3 of 8
Easily expandable: It is easily expandable as new stations can be added to the open ports
on the hub.
Cost effective: Star topology networks are cost-effective as it uses inexpensive coaxial
cable.
High data speeds: It supports a bandwidth of approx 100Mbps. Ethernet 100BaseT is
one of the most popular Star topology networks.
4) Tree topology
Tree topology combines the characteristics of bus topology and star topology.
A tree topology is a type of structure in which all the computers are connected with each
other in hierarchical fashion.
The top-most node in tree topology is known as a root node, and all other nodes are the
descendants of the root node.
There is only one path exists between two nodes for the data transmission. Thus, it forms
a parent-child hierarchy.
Page 4 of 8
5) Mesh topology
Full Mesh Topology: In a full mesh topology, each computer is connected to all the
computers available in the network.
Partial Mesh Topology: In a partial mesh topology, not all but certain computers are
connected to those computers with which they communicate frequently.
Page 5 of 8
Efficiency: In this topology, redundant connections are high that reduces the efficiency
of the network.
6) Hybrid Topology
The combination of various different topologies is known as Hybrid topology.
A Hybrid topology is a connection between different links and nodes to transfer the data.
When two or more different topologies are combined together is termed as Hybrid
topology and if similar topologies are connected with each other will not result in Hybrid
topology. For example, if there exist a ring topology in one branch of Equity bank and
bus topology in another branch of Equity bank, connecting these two topologies will
result in Hybrid topology.
Page 6 of 8
3. Performance Requirements
Question: What are the performance expectations in terms of data transmission speed
and network load?
Impact: Topologies like mesh and star offer better performance in high-traffic
environments since they provide multiple paths or centralized control for managing data
flows, while bus and ring topologies may experience congestion or slowdowns under
heavy loads.
6. Cabling Requirements
Question: What are the physical constraints of the environment, such as the amount of
cabling needed?
Impact: Bus topology requires less cabling, while mesh and star topologies require more
cable and potentially additional networking hardware (hubs, switches). The type of
environment (office, factory, campus) may influence the choice due to cable lengths,
layout restrictions, or costs.
8. Security
Question: How sensitive is the data being transmitted, and what are the security
requirements?
Impact: Some topologies are easier to secure than others. For instance, star topology
centralizes control at a hub or switch, where security measures like firewalls and
monitoring can be implemented. In contrast, bus topology may be more vulnerable to
eavesdropping due to the shared communication medium.
Page 8 of 8