Types of Network Topology-Protocols
Types of Network Topology-Protocols
Types of Network Topology-Protocols
Network topologies describe the methods in which all the elements of a network are
mapped. The topology term refers to both the physical and logical layout of a network.
BUS Topology
Bus topology is a network type in which every computer and network device is
connected to single cable. When it has exactly two endpoints, then it is
called Linear Bus topology.
1. It is cost effective.
4. It is easy to understand.
2. If network traffic is heavy or nodes are more the performance of the network
decreases.
RING Topology
1. A number of repeaters are used for Ring topology with large number of
nodes, because if someone wants to send some data to the last node in the
ring topology with 100 nodes, then the data will have to pass through 99
nodes to reach the 100th node. Hence to prevent data loss repeaters are
used in the network.
3. In Dual Ring Topology, two ring networks are formed, and data flow is in
opposite direction in them. Also, if one ring fails, the second ring can act as a
backup, to keep the network up.
STAR Topology
In this type of topology all the computers are connected to a single hub through a
cable. This hub is the central node and all others nodes are connected to the
central node.
Features of Star Topology
3. Easy to troubleshoot.
5. Only that node is affected which has failed, rest of the nodes can work
smoothly.
Disadvantages of Star Topology
2. Expensive to use.
3. If the hub fails then the whole network is stopped because all the nodes
depend on the hub.
4. Performance is based on the hub that is it depends on its capacity
MESH Topology
There are two techniques to transmit data over the Mesh topology, they are :
1. Routing
2. Flooding
In routing, the nodes have a routing logic, as per the network requirements. Like
routing logic to direct the data to reach the destination using the shortest distance.
Or, routing logic which has information about the broken links, and it avoids those
node etc. We can even have routing logic, to re-configure the failed nodes.
In flooding, the same data is transmitted to all the network nodes, hence no
routing logic is required. The network is robust, and the its very unlikely to lose the
data. But it leads to unwanted load over the network.
Types of Mesh Topology
2. Full Mesh Topology : Each and every nodes or devices are connected to
each other.
Features of Mesh Topology
1. Fully connected.
2. Robust.
3. Not flexible.
Advantages of Mesh Topology
2. It is robust.
TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is
also called hierarchical topology. It should at least have three levels to the
hierarchy.
1. Heavily cabled.
2. Costly.
HYBRID Topology
2. Effective.
4. Flexible.
Disadvantages of Hybrid Topology
1. Complex in design.
2. Costly.
1. HTTP: It is a layer 7 protocol that is designed for transferring a hypertext between two or more
systems. HTTP works on a client-server model, most of the data sharing over the web are done through
using HTTP.
2. TCP: It lay-outs a reliable stream delivery by using sequenced acknowledgment. It is a connection-
oriented protocol i.e., it establishes a connection between applications before sending any data. It is
used for communicating over a network. It has many applications such as emails, FTP, streaming
media, etc.
3. UDP: It is a connectionless protocol that lay-out a basic but unreliable message service. It adds no flow
control, reliability, or error-recovery functions. UPD is functional in cases where reliability is not
required. It is used when we want faster transmission, for multicasting and broadcasting connections,
etc.
4. BGP: It is a routing protocol that controls how packets pass through the router in an independent
system one or more networks run by a single organization and connect to different networks. It
connects the endpoints of a LAN with other LANs and it also connects endpoints in different LANs to
one another.
5. ARP: ARP is a protocol that helps in mapping Logical addresses to the Physical addresses
acknowledged in a local network. For mapping and maintaining a correlation between these logical and
physical addresses a table known as ARP cache is used.
6. IP: It is a protocol through which data is sent from one host to another over the internet. It is used for
addressing and routing data packets so that they can reach their destination.
7. DHCP: it’s a protocol for network management and it’s used for the method of automating the process
of configuring devices on IP networks. A DHCP server automatically assigns an IP address and various
other configurational changes to devices on a network so they can communicate with other IP networks.
it also allows devices to use various services such as NTP, DNS, or any other protocol based on TCP or
UDP.
2. Management
These protocols assist in describing the procedures and policies that are used in monitoring, maintaining,
and managing the computer network. These protocols also help in communicating these requirements
across the network to ensure stable communication. Network management protocols can also be used for
troubleshooting connections between a host and a client.
Examples of Management Protocols:
1. ICMP: It is a layer 3 protocol that is used by network devices to forward operational information and
error messages. It is used for reporting congestions, network errors, diagnostic purposes, and timeouts.
2. SNMP: It is a layer 7 protocol that is used for managing nodes on an IP network. There are three main
components in SNMP protocol i.e., SNMP agent, SNMP manager, and managed device. SNMP agent
has the local knowledge of management details, it translates those details into a form that is compatible
with the SNMP manager. The manager presents data acquired from SNMP agents, thus helping in
monitoring network glitches, network performance, and troubleshooting them.
3. Gopher: It is a type of file retrieval protocol that provides downloadable files with some description for
easy management, retrieving, and searching of files. All the files are arranged on a remote computer in
a stratified manner. It is an old protocol and it is not much used nowadays.
4. FTP: FTP is a Client/server protocol that is used for moving files to or from a host computer, it allows
users to download files, programs, web pages, and other things that are available on other services.
5. POP3: It is a protocol that a local mail client uses to get email messages from a remote email server
over a TCP/IP connection. Email servers hosted by ISPs also use the POP3 protocol to hold and receive
emails intended for their users. Eventually, these users will use email client software to look at their
mailbox on the remote server and to download their emails. After the email client downloads the
emails, they are generally deleted from the servers.
6. Telnet: It is a protocol that allows the user to connect to a remote computer program and to use it i.e., it
is designed for remote connectivity. Telnet creates a connection between a host machine and a remote
endpoint to enable a remote session.
3. Security
These protocols secure the data in passage over a network. These protocols also determine how the network
secures data from any unauthorized attempts to extract or review data. These protocols make sure that no
unauthorized devices, users, services can access the network data. Primarily, these protocols depend on
encryption to secure data.
Examples of Security Protocols:
1. SSL: It is a network security protocol mainly used for protecting sensitive data and securing internet
connections. SSL allows both servers to server and client to server communication. All the data
transferred through SSL is encrypted thus stopping any unauthorized person from accessing it.
2. HTTPS: It is the secured version of HTTP; this protocol ensures secure communication between two
computers where one sends the request through the browser and the other fetches the data from the
webserver.
3. TSL: It is a security protocol designed for data security and privacy over the internet, its functionality is
encryption, checking the integrity of data i.e., whether it has been tampered with or not and
Authentication. It is generally used for encrypted communication between servers and web apps, like a
web browser loading a website; it can also be used for encryption of messages, emails, VoIP.