A network topology is defined as a physical layout of a computer network in which two or more computer nodes are connected to each other. It provides a platform to interconnect computer networks and topology refer as a process that describes how the data or information is transmitted between nodes (Al-Sultan, Al-Doori, Al-Bayatti, & Zedan 2014). The main purpose of this report is to describe the various kinds of network topologies and their advantages and disadvantages. There are mainly two types of network topologies used in information technology, for example, physical and logical. Physical topology emphasizes two or more communicating devices with nodes and the logical topology focuses on the shape of the data transmission process.
There are many types of network topologies used in computer systems which are described below:
Topology |
Architecture |
Routing methods |
Complexity |
Expansion |
Reliability |
cost |
Cabling concerns |
Security |
Star |
In this type of process, the nodes of the network are interconnected to a main central node. |
In which all data transfer by the central network system |
Very simple and easy |
For connection, a new computer is required |
More reliable |
More costly |
Uses twisted pair data cables |
DOS attack |
Bus |
In this type of topology, only a single bus is used to connect two or more nodes |
One computer device transfer data at a time. |
Very simplest for the LAN |
To add other peripheral devices people should shut down the devices and remove all data cables |
Less reliability |
Very cheap |
A single cable is used |
Less secure |
Ring |
In which each computer node is connected with two branches |
Data is transferred into only one direction |
Used for LANs |
The connection between node must be removed to add computer system |
Large reliability |
More expansive |
Needs numbers of data cables |
Less secure |
Mesh |
In this type of topologies minimum, two nodes are connected with each other in different paths |
Can be used for long distance communication |
Used for WANs |
Connection systems make combining various types of networks |
Troubleshooting is more difficult in this process |
Very expensive |
Cabling depends upon the type of network devices |
More secure |
There are various kinds of advantages and disadvantages of network topologies which are described below:
Figure: network topologies
(Source: Diebold, & Y?lmaz, 2014)
Disadvantages
Disadvantages
There are different types of network devices are used during the network topologies that are operated on the OSI model layer. Following kinds of devices are used:
It is defined as a network device which is used to form the routing of signals from one device to another. It is operated in the field of OSI model and also called as network layer device that generally transfers data packets from one network to another. In router every packet have a unique IP address that makes it very simple for the process of routing to send data from one location to another (Toju, Guimarães, Olesen, & Thompson 2015).
Figure: Router
(Source: Toju, et al., 2015)
A network hub is a kind of computer device which is utilized to interconnect two or more network hosts at a time. The main application of the hub in the communication system is that it can be used for data transfer and data is sent in the form of packets. It is very less secure due to which user’s personal data can be lost.
Figure: Hub
(Source: Toju, et al., 2015)
This type of network device is used at the time of data-link that is a 2nd layer in the OSI model and the main purpose of this device is to identify the MAC address of the computer system. Moreover, the switch is a physical layer which is developed to produce the connection between two or more peripheral devices.
Figure: Switch
(Source: Toju, et al., 2015)
Device |
Hub |
Switch |
Layer |
Physical layer |
Data link layer |
Function |
To interconnect a network of the private computer together |
To interconnect multiple computers at a time |
Data transmission form |
Electrical signals |
Frame and packets |
Ports |
4/12 |
24/48 |
TCP model is a very common type of network protocol which is used in all internet operations but it does not use all the layers of the OSI model. In which the host to host layer is equivalent to the OSI layer and the application layer is very similar to the 5, 6, and 7 OSI layer.
Figure: TCP Vs OSI model
(Source: Diebold, & Y?lmaz, 2014)
OSI is defined as a network protocol which is an independent process that provides communication between the network and the consumers. It follows the vertical approach but the TCP model use a horizontal approach (Liu, Pellegrini, & Wang, 2014).
Figure: the difference between OSI and TCP/IP model
(Source: Diebold, & Y?lmaz, 2014)
In which the three upper layers such as application, presentation, and session map to the application layer of TCP/IP. The bottom layer of OSI model (physical and data link) are mapped with the network access layer of TCP/IP with the help of internet and the network layer is similar to the IP layer of TCP (Shine, Koyejo, & Poldrack, 2016). People can use the TCP/IP model in their network system because it has the ability to reduce the security-related issues and threats and it is more effective rather than OSI.
References
Al-Sultan, S., Al-Doori, M. M., Al-Bayatti, A. H., & Zedan, H. (2014). A comprehensive survey on vehicular ad hoc network. Journal of network and computer applications, 37(4), 380-392.
Betzel, R. F., Gu, S., Medaglia, J. D., Pasqualetti, F., & Bassett, D. S. (2016). Optimally controlling the human connectome: the role of network topology. Scientific reports, 6(2), 30770.
Diebold, F. X., & Y?lmaz, K. (2014). On the network topology of variance decompositions: Measuring the connectedness of financial firms. Journal of Econometrics, 182(1), 119-134.
Gal, E., London, M., Globerson, A., Ramaswamy, S., Reimann, M. W., Muller, E., … & Segev, I. (2017). Rich cell-type-specific network topology in neocortical microcircuitry. Nature Neuroscience, 20(7), 1004.
Liu, W., Pellegrini, M., & Wang, X. (2014). Detecting communities based on network topology. Scientific reports, 4, 5739.
Shine, J. M., Koyejo, O., & Poldrack, R. A. (2016). Temporal metastases are associated with differential patterns of time-resolved connectivity, network topology, and attention. Proceedings of the National Academy of Sciences, 113(35), 9888-9891.
Toju, H., Guimarães, P. R., Olesen, J. M., & Thompson, J. N. (2015). Below-ground plant–fungus network topology is not congruent with above-ground plant-animal network topology. Science advances, 1(9), e1500291.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download