Essay PreviewMore ↓
It just doesn't get much simpler than the physical bus topology when it comes to connecting nodes on a Local Area Network (LAN). The most common implementation of a linear bus topology is IEEE 802.3 Ethernet. All devices in a bus topology are connected to a single cable called the bus, backbone, or ether. The transmission medium has a physical beginning and an end. All connections must be terminated with a resistor to keep data transmissions from being mistaken as network traffic. The terminating resistor must match the impedance of the cable.
One advantage of bus topology is that small networks are fairly easy to set up and does not require specialized networking equipment. It is also fairly inexpensive to set up, since it requires the least amount of cable and equipment. Adding or removing nodes is fairly easy, but moving nodes without affecting neighboring nodes can be difficult.
Troubleshooting media problems on a bus networks can be very tedious, since a break in the backbone will bring down the entire LAN. For this reason, bus topology is not considered one of the more robust network topologies, compared with star or mesh. A loose or missing terminating resistor can also bring down a LAN.
In this topology, all nodes are connected to a central device, usually a hub or a switch. Each connected device has a dedicated, point-to-point connection between the device and the hub. The star network topology is by far the most widely implemented topology in use today.
Star topology networks require more cabling than bus, but the tradeoff comes in the form of a more solid network topology. A break in the network media will only affect a single node, since every node has a dedicated connection to the central device; a hub or switch. This also makes the central device a Single Point of Failure (SPOF). Redundant or failover switches are often used to eliminate the SPOF in a star LAN.
Building a star topology is much more expensive and time consuming than the bus network. The increased costs come in the form of cabling and the central device(s). However, star topologies can be easily expanded to accommodate more nodes and troubleshooting is much easier because connectivity problems are simpler to isolate than a bus network.
Perhaps the most redundant, fault-tolerant of all network topologies is the mesh LAN. Each node is connected to every other node for a true point-to-point connection between every device on the network.
How to Cite this Page
"Networking Topologies and TCP/IP Protocol." 123HelpMe.com. 19 Aug 2018
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Topologies Comparison Topologies are categorized into different virtual shapes or structures with the basic types being Mesh, Bus, Ring, and Star. “More complex networks can be built as hybrids of two or more of the above basic topologies.” (Mitchell, 2008) These basic topologies are structured in to networks as Ethernet, Token Ring, FDDI, and wireless networking. Any business or individual making a decision of which type of topology is best used for a specific environment or network should know and understand the advantages and disadvantages of each type of topology, in addition to the advantages and disadvantages of each network type.... [tags: Network Topology]
1348 words (3.9 pages)
- Bead Bar Network The Bead Bar has the following computer systems: fifteen desktop computers, two notebook computers, and one handheld computer. (Malaga, 2005). The personal computers are equipped with standard keyboards, 17 inch CRT monitors, printers2.8 MHz processor, 512.8 MB of RAM, CD-RW drives, and 80 GB hard drives. Each of the computers uses the Microsoft Windows XP Professional operating system, and due to the multiple locations of the company, the Oracle 9i Database, an enterprise database specifically designed to manage the distributed data necessary for the Bead Bar's organizational needs.... [tags: Business Management Analysis]
935 words (2.7 pages)
- CAN originally developed for the automotive industry is an International Standardization Organization (ISO) defined serial bus standard to replace the complex wiring with a two-wire bus. The specification signifies the high immunity to electrical interference. The ability to self diagnose and repair data errors make it significant. The CAN communication protocol is based on carrier-sense, multiple-access protocol using collision detection and arbitration on message priority (CSMA/CD+AMP). Normally, a logic-high is associated with a one, and a logic-low is associated with a zero – however not so on a CAN bus.... [tags: automotive industry, protocol controller]
1240 words (3.5 pages)
- This paper is about a computer pioneer before the 1990s. A computer pioneer is someone who has had an impact in the development or improvement of the computer. The paper will discuss the computer pioneer’s legacy and how it has affected the change of computers. The topic of this paper is TCP/IP and their designers, Vinton Cerf and Robert Kahn. TCP/IP stands for Transmission Control Protocol/Internet Protocol, which is the protocol of the Internet. In a private network, TCP/IP can be used as a communications protocol; the TCP/IP can either be an intranet or extranet.... [tags: Computer Science]
2193 words (6.3 pages)
- This paper is about a computer pioneer before the 1990s. A computer pioneer is someone who has had an impact in the development or improvement of the computer. The paper will discuss the computer pioneer’s legacy and how it has affected the change of computers. The topic of this paper is TCP/IP and their designers, Vinton Cerf and Robert Kahn. TCP/IP stands for Transmission Control Protocol/Internet Protocol. TCP/IP is the protocol of the Internet. TCP/IP can also be used in a private network as a communications protocol; the TCP/IP can either be an intranet or extranet.... [tags: Computing]
1785 words (5.1 pages)
- User Datagram Protocol is one of the transport layer protocol which offers limited amount of service when messages are exchanged between hosts. Data is further subdivided into data grams for transmission across the hosts. UDP does not allow retransmission of the damaged or lost packets and there is no acknowledgement for the packet which has been sent. DGRAM_SOCK is the type of socket used for transmission of data. Unlike TCP, however, UDP does not provide the service of dividing a message into packets (datagram's) and reassembling it at the other end.... [tags: data, udp, internet protocol]
988 words (2.8 pages)
- Abstract : Internet Protocol version 6(Pv6) is the advanced version of the IPv4 protocol and both of these protocols are part of TCP/IP suite.TCP/IP is the only protocol for transmission of data over the internet As the internet is not secure place for transmission of secure and confidential information (packets) So to protect this information over the non secure channels(internet ) the IPSec was introduced .IPSec is the worldly know standard for the secure transmission over the internet . IPSec is mandatory for IPv6 and optional for IPv4 deployments .But as the IPsec provides authentication, confidentiality and integrity of the internet protocol (IP) packets but it slows down the transmi... [tags: Technology, Networking]
1210 words (3.5 pages)
- LAN Topologies *Works Cited Not Included When designing the layout of a local area network, an organization can choose from a variety of different technologies on which to base the backbone of their LAN. The technology choices that the organization adopts will play a critical role in the performance of its LAN. Two important LAN backbone issues, which I will introduce, include: · A network based on Ethernet or Token Ring technology · Factors to consider when choosing a Network Operating System LANs are also known as subnets, which are single networks.... [tags: Papers]
1975 words (5.6 pages)
- Short Answers to Differences (Including Advantages and Disadvantages) Between: Mesh, Bus, Ring, and Star topologies Ethernet, Token Ring, FDDI, and wireless Mesh A mesh topology has a point-to-point connection to every other device (node) within the topology. The point-to-point link is dedicated between each device so it will only carry traffic to the two devices that is connected by that link. The advantage of a mesh topology is it works on the concept of routes, which means that traffic can take one of several paths between the source and destination.... [tags: Definition Technology Network Topologies]
1745 words (5 pages)
- Mesh, Bus, Ring and Star topologies The term Topology refers to the physical or logical shape or layout of a network. Communication between different nodes within a network is determined by its topology. Mesh, Bus, Ring and Star are four of the most common network topologies, each with advantages and disadvantages in relation to each other. Mesh Topology The Mesh topology is true to its name in that there are multiple redundant interconnections between network nodes. A mesh network can employ one of two connection arrangements, full mesh or partial mesh.... [tags: Network Topology]
1391 words (4 pages)
While the mesh topology is by far the most robust of the LAN topologies, the tradeoff is cost, complexity, and difficulty of troubleshooting. Mesh requires the most cabling of any topology. Because of these disadvantages, a true mesh topology is seldom used. Instead, a hybrid mesh, with redundant cabling paths to critical network devices like routers, is sometimes used in the core layer of networks.
Ring topology is actually a logical ring, which means that while the data travels in a circular pattern from one node to another, the cabling pattern can take on any form. Since each station acts as a repeater, greater distances can be spanned with a ring network than other physical topologies. Ring networks can also offer higher bandwidth with almost no signal degeneration. Fiber-optic media is commonly used in modern ring topology.
An advantage of the ring network is troubleshooting and isolating a break in the media is much easier than other topologies. Some ring technologies have the ability to locate the break for the technician. When a break does occur, the network is effectively down. Many modern rings are built with a redundant or secondary ring to make a more fault-tolerant network. This dual-ring is referred to as Fiber Distributed Data Interface (FDDI).
Comparison of Network Transport Protocols
Ethernet (IEEE 802.3 CSMA/CD) has several advantages over other transport protocols like Token Ring and wireless. First of all, Ethernet hardware and cabling is relatively inexpensive, compared with FDDI or wireless. The simplicity of Ethernet also reduces the expense of maintenance and support. Second, Ethernet allows for various types of networking media such as twisted pair, coaxial, and even fiber. Ethernet also offers more security than wireless, since connectivity requires physical access to the wire.
While wireless is often considered Ethernet, it uses CSMA/CA (Carrier Sensing Media Access/Collision Avoidance). Wireless network security and signal interference has been a real concern for network administrators. Most of these concerns have been addressed, but the reputation of being a largely free and wide-open media still lingers.
Perhaps the greatest advantage of wireless networks is the freedom from physical cabling. Laptop users can finally use their machines as they were intended; away from a desk. Unfortunately, wireless LAN standards (IEEE 802.11) are considerably slower than their wired counterparts. 802.11a wireless is capable of speeds up to 72Mbps; however, it is currently restricted to a throughput of 54Mbps by the FCC.
While Token Ring (IEEE 802.5) bandwidth was speedy for 1980's (4 or 16Mbps), its performance would be hardly sufficient for all but the smallest of LAN networks today. What really made Token Ring such an attractive network transport protocol for its time was its method for handling collisions, called token passing. A station must posses the token to transmit data. When a host has data to transmit, it waits until the token is passed, changes one bit on the token and passes the data. The receiving station must wait until the token is passed and remove the data and place the empty token back on the ring. While collisions are expected and even anticipated in Ethernet, in Token Ring networks, they are almost non-existent. Token Ring even has error corrections methods to detect if a token is hung up by clearing the ring and starting a new token.
Unlike IEEE 802.5 Token Ring, FDDI uses a dual-ring technology for redundancy and fault tolerance. Should the primary ring fail, the secondary ring can take over with no disruption to users on the network. FDDI uses multiple tokens, which is vastly different than 802.5 Token Ring. Since FDDI used fiber and a media, collisions are virtually impossible. Fiber-optic pulses can only travel in one direction, so separate cables must be used to transmit and receive.
FDDI is undoubtedly the most expensive, fastest, and the most secure way to transmit data across a network. Fiber-optic cable is immune copper and wireless problems like Electromagnetic Interference (EMI), crosstalk, attenuation, and degradation of the signal. The expense of operating FDDI comes not only from the fiber-optic cabling itself, but the specialty networking equipment required to send and receive the light pulses.
ISO OSI vs. TCP/IP model
The ISO OSI, seven-layer networking model is a conceptual model only. Not one working protocol truly matches up layer-for-layer with the OSI model. The designers of the OSI model never intended it to be a working protocol, but rather as a reference tool.
The TCP/IP model was designed to allow communication among a variety of multi-vendor, independent systems.
There are versions of the TCP/IP model ranging from as few as three layers to as many as five. The top three layers of the OSI model (Application, Presentation, and Session) are combined into the Application layer of the TCP/IP model. The transport layer is the same in both models. The Internet layer of the TCP/IP model equates to the Network layer of the OSI model. Both the Data Link and Physical layers of the OSI model map to the Network Access layer of the four-layer TCP/IP model. One similarity of both models is that they assume packet-switched technology, not circuit-switched technology (SONET/ATM) is in use.
Harwood, Mike, Tittel, Ed (Ed.) (2003). Network+ Exam Cram (Exam N10-002). Indianapolis, IN: Que Certification.
Kozierok, Charles M. (2004). The TCP/IP Guide. Retrieved August 14, 2005 from http://www.tcpipguide.com/index.htm.
McQuerry, Steve (Ed.) (2004). CCNA Self-Study: Introduction to Cisco Networking Technologies (INTRO). Indianapolis, IN: Cisco Press.
Tomsho, Greg, Tittel, Ed, Johnson, Greg (2004). Guide to Networking Essentials [University of Phoenix Custom Edition e-text]. Thomson Learning, Inc. Retrieved Aug 14, 2005 from University of Phoenix, Resource, NTC/360 Network and Telecommunications Concepts Web site: https://ecampus.phoenix.edu/secure/resource/resource.asp.