pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Network Topologies

LAN topologies define the manner in which network devices are organized. Four common LAN topologies exist:

  • A bus topology is a linear LAN architecture in which transmissions from network stations propagate the length of the medium and are received by all other stations. Many nodes can tap into the bus and begin communication with all other nodes on that cable segment. A break anywhere in the cable will usually cause the entire segment to be inoperable until the break is repaired. Of the three most widely used LAN implementations, Standard Ethernet/IEEE 802.3 networks implement a bus topology in which all devices are connected to a central cable, called the bus or backbone.
  • A ring topology is a LAN architecture in which all devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it. Both Token Ring/IEEE 802.5 and FDDI networks implement a ring topology.
  • A star topology is a LAN architecture in which the endpoints on a network are connected to a common central hub, or switch, by dedicated links. 10BaseT Ethernet uses a star topology, generally with a computer being located at one end of the segment, and the other end being terminated with a hub. The primary advantage of this type of network is reliability – if one point-to-point segments has a break, it will only affect the nodes on that link; other computer users on the network continue to operate as if that segment were non-existent.
  • A tree topology is a LAN architecture that is identical to the bus topology, except that branches with multiple nodes are possible in this case.

topology.gif

These topologies are logical architectures and the way in which devices are physically organized can mix topologies. For example, a star-wired bus network – as used by 10BaseT Ethernet – typically consists of a high-bandwidth backbone bus which connects to a collection of slower-bandwidth star segments.

These topologies are logical architectures and the way in which devices are physically organized can mix topologies. For example, a 10BaseT network’s use of a hub effectively transforms a standard bus topology to a star-wired bus topology. A network comprising a high-bandwidth backbone bus which connects to a collection of slower-bandwidth star segments is another common example of this type of mixed topology.

Of the three most widely used LAN implementations, both Fibre Distributed Data Interface (FDDI) and Token Ring/IEEE 802.5 networks implement a ring topology and Ethernet/IEEE 802.3 networks implement a bus topology.

  • OSI Model
  • Network Topologies
  • FDDI Networking
  • Token Ring Networks
  • Ethernet
  • Fast Ethernet
  • Gigabit Ethernet
  • Peer to Peer Network Architecture
  • Client/Server Architecture
  • P2P Networking
  • Network Hardware
  • NIC Cards
  • Hubs and Repeaters
  • Bridges
  • Routers
  • Network Switches
  • Network Transceivers
  • Cabling
  • Home Networking
  • Ethernet Networks
  • Phone-line Networks
  • Power-line Networks
  • IEEE 802.11
  • Wireless Networks
  • Technology Comparison

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Related

Filed Under: Networking Tagged With: Network Topologies

Latest Articles

Features and Parts of a Digital Camera

A colour LCD panel is a feature that is present on virtually all modern digital cameras. It acts as a mini GUI, allowing the user to adjust the full range of settings offered by the camera and is an invaluable aid to … [Read More...]

av secure 2012

AV Secure 2012

AV Secure 2012 AV Secure 2012 is a malware client. These kinds of viruses pretend to be legit programs but they are far from it. AV Secure 2012 will scan you computer and show you false virus infections. Users will get constant warnings that they are infected and they need to purchase the AV Secure … [Read More...]

SSE4 – Intel’s enhanced multimedia focussed CPU instruction set

SSE4 is a set of instructions released in conjunction with Intel's Penryn processor. SSE4, built upon the Intel 64 Instruction Set Architecture, represented Intel's first major change to its instruction set for some time, and followed smaller changes introduced (in the guise of … [Read More...]

2021 PC Hardware Releases to Bolster Your Gaming

If you are a PC gamer, then chances are you are looking to upgrade your kit over the coming year. However, a lot of money can go into building the … [Read More...]

New Transfer Feature in Dropbox Enable Sharing files with Third Parties

Dropbox has been a popular P2P sharing platform for many years. They don't announce new features as often as other applications, since they have a … [Read More...]

Ransomware Operators Find Data Theft Profitable

How valuable is your data? That’s not a question that organizations or individuals have to ask themselves all that often. You might know the market … [Read More...]

Engineers Encounter the Quantum Challenge with Computers Running a Hundred Million Times Faster

Quantum computers have been a subject of discussion for many years. They have probably been something that philosophers and technology pundits have … [Read More...]

Transferring Image Files from Your Cell Phone Without Cables or Email

You don't have a cable available to transfer the photos from your cell phone to your computer? You don't feel comfortable sending them through your … [Read More...]

Why Drupal Accessibility is Vital for Your Website

Drupal may not be as popular as WordPress, but it is still used in over 1 million websites. The Internet might be more conducive to our needs if more … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Guidelines on Processing Big Data with Hadoop

We are observing an increasing number of social and industrial applications where the flow of data and information grows at an exponential rate, which … [Read More...]

FBI Money Pak Virus

FBI MoneyPak is a malware client that holds your computer for ransom until you pay a fine. As stated this is malware, a computer virus that infected … [Read More...]

Change Computer Name in Windows 7

When you install Windows 7 for the first time you get a random generated name for your computer if you accept the defaults. Many times, this name will … [Read More...]

[footer_backtotop]

Copyright © 2021 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors