Network Topology Advantages And Disadvantages

Improved Essays
In today’s world we are exchanging data and communicating faster than ever before. In a click of a button we can send and receive messages or even video chat. Any device that can be connected to a network has the power to do so. Continuing our technology advancements, we always have the need to upgrade and improve our networks for many reasons. There are a lot more households using Local Area Networks (LAN) in this generation than past generations. Within a Local Area Network there are a few ways to lay out a physical topology of a network. There is the ring topology, which is rarely used today. There is also the bus topology, which is also rarely used today because it is an outdated physical topology because of our technological growth. Lastly, the star topology which is the most common topology used today. Let’s look further into these three topologies to see how they work, to see the type of wires they use, and to see their advantages and disadvantages. …show more content…
The ring topology is a network configuration where each computer is connected to each other. It makes the shape of a ring or circle. All the computers on the network are connected together. The data packages that are sent through each node on this network are sent around in one direction at high speeds until the data packages reach its final destination. This network is one of the simplest of them all. The advantage of the ring topology network is that it is easy to install and also easy to troubleshoot when it is not working properly. The disadvantage of the ring topology network is that each computer that is connected to the network relies on each other. This means that if one computer or cable goes down all of the data flow would be interrupted throughout out the network connection. This will cause the network to slow down and eventually the network will collapse until the issue is corrected. Below is an example of what a ring topology looks

Related Documents

  • Decent Essays

    Due to the age of the existing equipment, four new Cisco Catalyst 3560 V2 24 port switches will be use and configure for network redundancy by connecting each switch in a multiple links, single IP address with routing protocol Border Gateway Protocol (BGP). This multi-homing will detect when one of the links fail and not send traffic over that link anymore until the issue is resolved. This redundancy configuration will meet Western County Bank management requirement reducing unplanned outages and regular maintenance performed on the network equipment supporting 10 GB links as well as static or LACP-based (link aggregation control protocol) network interface controller (NIC) teaming. The Time Warner Cable, Business, Dedicated Internet Access, and AT&T Uverse Business Internet service will provide redundancy to the Internet…

    • 452 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 9 Case Study

    • 1143 Words
    • 5 Pages

    I would install the Star topology which is the most common type of network topology that is used in offices. Star topology is the best since each node is connected by more than one link basically two connection to reach a node. The speed of most star configurations is hundred megabits of data per second with gigabit hub or switches and NIC cards speeds can be at one thousand megabits per second. In a star topology is possible to have all the important data back ups on the hub in a private folder so if the computers fails, the employees can still use the data using the next computer in the network and accessing the backup files on the hub. If the hub adds a device like a printer all the other computers on the network can access the new device by simple accessing the hub.…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    It is composed of software controllers that communicate with the forwarding network fundamentals through standard interfaces, referred also as the South Bound Interface. The last layer is called Application Layer which takes care of…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    CS320 Assignment 1 Andrew McConnon 13349871 You want to connect different computers, at different locations, so that they can exchange data with each other. What are the different challenges that you need to overcome? Host Identification on small networks isn’t a problem as it can be set up with manual ways of addressing, but will be exponentially harder the larger a network becomes. Protocols, DHCP servers and addressing are a huge need if you want to create and sustain a large, expanding network.…

    • 399 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Due to the fact that all of your communication systems will be unified under this secure network, you will be able to enjoy maintenance and operations savings on a monthly basis. BroadConnect’s phone systems provide portable connectivity through a private…

    • 480 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    NS-2 offers a poor graphical support, no Graphical User Interface (GUI), the subscribers have to directly face to text commands of the electronic devices. Because of the continuing modifying the code base, the result may not be consistent and consist bugs. NS-2 cannot simulate issues of the power consumption, bandwidth or energy saving in WSN. NS-2 has a scalability issue no. of nodes cannot be greater than 100.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    Use of multiple routers in interconnected networks: Exchanging information about destination addresses using a dynamic routing protocol. A router has different physical ways to operate network connections, such as: • Fibre optic • Copper cables • Wireless A router also contains several firmware for different networks’ protocol standards.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Abstract: With a specific end goal to outline and fabricate the secured network system, numerous elements must be thought seriously about, for example, the topology and position of hosts inside of the system, the determination of equipment and programming innovations, what's more, the cautious arrangement of every part. My paper will be an examination of the issues percentage in outlining a safe Local Area Network (LAN) and a best's portion practices proposed by security specialists. I will examine securing a LAN from network's perspective. [1] Introduction: With most complex innovations, there's not one size-fits-all arrangement regarding the matter of network administration. The needs and assets of every one of a kind association will relate…

    • 877 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Naplan Disadvantages

    • 289 Words
    • 2 Pages

    An advantage of NAPLAN is its alignment with an evidence-based model for teaching and learning (Hattie, 2005). NAPLAN provides comprehensive evidence about how teachers’ current strategies are working or not working; it is a prompt for teachers to constantly evolve in their profession (Hattie, 2005). It is through the use of an evidence-based model in which, teacher quality is improved. This is a prominent feature in education in countries such as Finland who are currently out performing Australia. (SMH, 2015).…

    • 289 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Router to router 4. Pc to pc. Wi-Fi Technology This was used to connect the electronic devices used in the network using the 2.4-gigahertz.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Great Essays

    N Logue Case Study

    • 1457 Words
    • 6 Pages

    This facility of the center will be deployed by n-Logue and handled by LSP. These LSPs will be able to give away following services to customers. They are: • Email facility • Hosting of customer’s web pages • Hosting of customer’s servers (Almutairi, 2007) Similarly, various set of repeater stations will be installed as well helping out coverage for almost 25 km radius from various stations of the hub. This mean, these access centers can approximately emit signal data up to 2000 sq.…

    • 1457 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Home Network Analysis

    • 1256 Words
    • 5 Pages

    A general definition of a home network would be the interconnection between two or more computers to establish a local area network inside the home. With the advancement of the technology, the notion of computers has changed because many devices can do the same job that computers do. Therefore, let us define a home network as a local area network that allows digital devices present inside of a home to communicate together. We will enumerate a list of Home Network devices and we will write about the different features of each device. Home Network devices can be anything that can connect with another one to form a Local area Network (LAN): modem, router, hub, switch, Desktop computer, laptop, printer, Xbox, PlayStation, smart TV, tablet, IP…

    • 1256 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The Internet was originally called the ARPANET, and in order to enhance the ARPANET to be enable may different types of computer networks to all communicate with each other, an open source protocol needed to be created, hence the development of TCP/IP. TCP/IP improved communications throughout the network and allowed all computers to easily communicate with one another. Another technology that helped expand the ARPANET to more users in a specific location was the development of the Ethernet. Ethernet is a coaxial cable that is still used today in many local area networks. Ethernet is highly effective in moving data from one computer to another at high speeds.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4. Missing Elements In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet.…

    • 923 Words
    • 4 Pages
    Improved Essays