Types of Network Topology-Protocols

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

Types of Network Topology

Network topologies describe the methods in which all the elements of a network are
mapped. The topology term refers to both the physical and logical layout of a network.

BUS Topology

Bus topology is a network type in which every computer and network device is
connected to single cable. When it has exactly two endpoints, then it is
called Linear Bus topology.

Features of Bus Topology

1. It transmits data only in one direction.

2. Every device is connected to a single cable


Advantages of Bus Topology

1. It is cost effective.

2. Cable required is least compared to other network topology.

3. Used in small networks.

4. It is easy to understand.

5. Easy to expand joining two cables together.


Disadvantages of Bus Topology

1. Cables fails then whole network fails.

2. If network traffic is heavy or nodes are more the performance of the network
decreases.

3. Cable has a limited length.

4. It is slower than the ring topology.

RING Topology

It is called ring topology because it forms a ring as each computer is connected to


another computer, with the last one connected to the first. Exactly two neighbours
for each device.
Features of Ring Topology

1. A number of repeaters are used for Ring topology with large number of
nodes, because if someone wants to send some data to the last node in the
ring topology with 100 nodes, then the data will have to pass through 99
nodes to reach the 100th node. Hence to prevent data loss repeaters are
used in the network.

2. The transmission is unidirectional, but it can be made bidirectional by having


2 connections between each Network Node, it is called Dual Ring Topology.

3. In Dual Ring Topology, two ring networks are formed, and data flow is in
opposite direction in them. Also, if one ring fails, the second ring can act as a
backup, to keep the network up.

4. Data is transferred in a sequential manner that is bit by bit. Data transmitted,


has to pass through each node of the network, till the destination node.
Advantages of Ring Topology

1. Transmitting network is not affected by high traffic or by adding more nodes,


as only the nodes having tokens can transmit data.

2. Cheap to install and expand


Disadvantages of Ring Topology

1. Troubleshooting is difficult in ring topology.

2. Adding or deleting the computers disturbs the network activity.

3. Failure of one computer disturbs the whole network.

STAR Topology

In this type of topology all the computers are connected to a single hub through a
cable. This hub is the central node and all others nodes are connected to the
central node.
Features of Star Topology

1. Every node has its own dedicated connection to the hub.

2. Hub acts as a repeater for data flow.

3. Can be used with twisted pair, Optical Fibre or coaxial cable.


Advantages of Star Topology

1. Fast performance with few nodes and low network traffic.

2. Hub can be upgraded easily.

3. Easy to troubleshoot.

4. Easy to setup and modify.

5. Only that node is affected which has failed, rest of the nodes can work
smoothly.
Disadvantages of Star Topology

1. Cost of installation is high.

2. Expensive to use.

3. If the hub fails then the whole network is stopped because all the nodes
depend on the hub.
4. Performance is based on the hub that is it depends on its capacity

MESH Topology

It is a point-to-point connection to other nodes or devices. All the network nodes


are connected to each other. Mesh has n(n-1)/2 physical channels to link n devices.

There are two techniques to transmit data over the Mesh topology, they are :

1. Routing

2. Flooding

MESH Topology: Routing

In routing, the nodes have a routing logic, as per the network requirements. Like
routing logic to direct the data to reach the destination using the shortest distance.
Or, routing logic which has information about the broken links, and it avoids those
node etc. We can even have routing logic, to re-configure the failed nodes.

MESH Topology: Flooding

In flooding, the same data is transmitted to all the network nodes, hence no
routing logic is required. The network is robust, and the its very unlikely to lose the
data. But it leads to unwanted load over the network.
Types of Mesh Topology

1. Partial Mesh Topology : In this topology some of the systems are


connected in the same fashion as mesh topology but some devices are only
connected to two or three devices.

2. Full Mesh Topology : Each and every nodes or devices are connected to
each other.
Features of Mesh Topology

1. Fully connected.

2. Robust.

3. Not flexible.
Advantages of Mesh Topology

1. Each connection can carry its own data load.

2. It is robust.

3. Fault is diagnosed easily.

4. Provides security and privacy.


Disadvantages of Mesh Topology

1. Installation and configuration is difficult.

2. Cabling cost is more.

3. Bulk wiring is required.

TREE Topology

It has a root node and all other nodes are connected to it forming a hierarchy. It is
also called hierarchical topology. It should at least have three levels to the
hierarchy.

Features of Tree Topology

1. Ideal if workstations are located in groups.

2. Used in Wide Area Network.


Advantages of Tree Topology

1. Extension of bus and star topologies.

2. Expansion of nodes is possible and easy.

3. Easily managed and maintained.


4. Error detection is easily done.

Disadvantages of Tree Topology

1. Heavily cabled.

2. Costly.

3. If more nodes are added maintenance is difficult.

4. Central hub fails, network fails.

HYBRID Topology

It is two different types of topologies which is a mixture of two or more topologies.


For example if in an office in one department ring topology is used and in another
star topology is used, connecting these topologies will result in Hybrid Topology
(ring topology and star topology).
Features of Hybrid Topology

1. It is a combination of two or topologies

2. Inherits the advantages and disadvantages of the topologies included


Advantages of Hybrid Topology

1. Reliable as Error detecting and trouble shooting is easy.

2. Effective.

3. Scalable as size can be increased easily.

4. Flexible.
Disadvantages of Hybrid Topology

1. Complex in design.

2. Costly.

Types of Network Protocols and Their Uses


A network protocol is an accepted set of rules that govern data communication between different devices in
the network. It determines what is being communicated, how it is being communicated, and when it is
being communicated. It permits connected devices to communicate with each other, irrespective of internal
and structural differences.
Types of protocols
The protocols can be broadly classified into three major categories-
1. Communication
2. Management
3. Security
1. Communication
Communication protocols are really important for the functioning of a network. They are so crucial that it
is not possible to have computer networks without them. These protocols formally set out the rules and
formats through which data is transferred. These protocols handle syntax, semantics, error detection,
synchronization, and authentication.
Examples of Communication Protocols:

1. HTTP: It is a layer 7 protocol that is designed for transferring a hypertext between two or more
systems. HTTP works on a client-server model, most of the data sharing over the web are done through
using HTTP.
2. TCP: It lay-outs a reliable stream delivery by using sequenced acknowledgment. It is a connection-
oriented protocol i.e., it establishes a connection between applications before sending any data. It is
used for communicating over a network. It has many applications such as emails, FTP, streaming
media, etc.
3. UDP: It is a connectionless protocol that lay-out a basic but unreliable message service. It adds no flow
control, reliability, or error-recovery functions. UPD is functional in cases where reliability is not
required. It is used when we want faster transmission, for multicasting and broadcasting connections,
etc.
4. BGP: It is a routing protocol that controls how packets pass through the router in an independent
system one or more networks run by a single organization and connect to different networks. It
connects the endpoints of a LAN with other LANs and it also connects endpoints in different LANs to
one another.
5. ARP: ARP is a protocol that helps in mapping Logical addresses to the Physical addresses
acknowledged in a local network. For mapping and maintaining a correlation between these logical and
physical addresses a table known as ARP cache is used.
6. IP: It is a protocol through which data is sent from one host to another over the internet. It is used for
addressing and routing data packets so that they can reach their destination.
7. DHCP: it’s a protocol for network management and it’s used for the method of automating the process
of configuring devices on IP networks. A DHCP server automatically assigns an IP address and various
other configurational changes to devices on a network so they can communicate with other IP networks.
it also allows devices to use various services such as NTP, DNS, or any other protocol based on TCP or
UDP.
2. Management
These protocols assist in describing the procedures and policies that are used in monitoring, maintaining,
and managing the computer network. These protocols also help in communicating these requirements
across the network to ensure stable communication. Network management protocols can also be used for
troubleshooting connections between a host and a client.
Examples of Management Protocols:
1. ICMP: It is a layer 3 protocol that is used by network devices to forward operational information and
error messages. It is used for reporting congestions, network errors, diagnostic purposes, and timeouts.
2. SNMP: It is a layer 7 protocol that is used for managing nodes on an IP network. There are three main
components in SNMP protocol i.e., SNMP agent, SNMP manager, and managed device. SNMP agent
has the local knowledge of management details, it translates those details into a form that is compatible
with the SNMP manager. The manager presents data acquired from SNMP agents, thus helping in
monitoring network glitches, network performance, and troubleshooting them.
3. Gopher: It is a type of file retrieval protocol that provides downloadable files with some description for
easy management, retrieving, and searching of files. All the files are arranged on a remote computer in
a stratified manner. It is an old protocol and it is not much used nowadays.
4. FTP: FTP is a Client/server protocol that is used for moving files to or from a host computer, it allows
users to download files, programs, web pages, and other things that are available on other services.
5. POP3: It is a protocol that a local mail client uses to get email messages from a remote email server
over a TCP/IP connection. Email servers hosted by ISPs also use the POP3 protocol to hold and receive
emails intended for their users. Eventually, these users will use email client software to look at their
mailbox on the remote server and to download their emails. After the email client downloads the
emails, they are generally deleted from the servers.
6. Telnet: It is a protocol that allows the user to connect to a remote computer program and to use it i.e., it
is designed for remote connectivity. Telnet creates a connection between a host machine and a remote
endpoint to enable a remote session.
3. Security
These protocols secure the data in passage over a network. These protocols also determine how the network
secures data from any unauthorized attempts to extract or review data. These protocols make sure that no
unauthorized devices, users, services can access the network data. Primarily, these protocols depend on
encryption to secure data.
Examples of Security Protocols:
1. SSL: It is a network security protocol mainly used for protecting sensitive data and securing internet
connections. SSL allows both servers to server and client to server communication. All the data
transferred through SSL is encrypted thus stopping any unauthorized person from accessing it.
2. HTTPS: It is the secured version of HTTP; this protocol ensures secure communication between two
computers where one sends the request through the browser and the other fetches the data from the
webserver.
3. TSL: It is a security protocol designed for data security and privacy over the internet, its functionality is
encryption, checking the integrity of data i.e., whether it has been tampered with or not and
Authentication. It is generally used for encrypted communication between servers and web apps, like a
web browser loading a website; it can also be used for encryption of messages, emails, VoIP.

You might also like