Computer Network Topology

Saturday, 8 May 2010 , Posted by My Blog at 16:44

Topology describes the structure of a network or how a network is designed. This pattern is very closely related to media access and delivery methods used. There were highly dependent topology with geofrapis location of each terminal, the quality control needed in the communication or messaging, as well as the speed of data transmission. In the definition of topology is divided into two, namely the physical topology (physical topology), which indicates the position of the physical cabling and topology of logic (logical topology) which shows how a medium accessible by the host. The physical topology is commonly used in building a network is: Point to Point (Point to Point). Networking ketitik point is the most simple networks but can be used widely. Once the simplicity of this network, which is often not considered as a network but only an ordinary communication. In this case, both nodes have the same level position, so that any node can initiate and control the relationship in the network. Data sent from one node another conclusion as the recipient directly, such as between terminals with the CPU. Star Network (Star Network). In a star configuration, some existing equipment will be linked into a central computer. Existing controls will be concentrated at one point, such as workload and set the settings of existing resources. All links should be related to the central data channel if you want to target other conclusion. In this case, when the center was down, then all terminals may also be disrupted. Star network model is relatively very simple, so widely used by the parties of the bank which usually have many branches in different locations. With the existence of this star configuration, then there are all sorts of activities at the branch offices it can be properly controlled and coordinated. In addition, the education world too much advantage of this star networks to control their students' activities. Excess · Damage on one channel only affect the channel network and the station adrift. · Security level is high. · Hold on a busy network traffic. · Additions and reductions station can be done easily. Shortage · If the node was malfunctioning, then the entire network to a halt. Handling · Prepared Need backup middle node. Ring Networks (Ring Network) In this network there are several devices are connected to one another and ultimately form the chart as well as a ring. Ring network does not have a point that acts as a central regulator or the data traffic, all nodes have the same level. Data sent will go throu Figure 3.1 star network topologygh several nodes, so arrive at the destination node. In the present data, the network can move in one or two directions. However, existing data remain moving in one direction at a time. First, existing messages will be delivered from other ketitik point in one direction. When encountered a failure, for example, there is damage to the existing equipment, so existing data will be sent with the second, then the message is transmitted in the opposite direction, and could ultimately end up at destination. Such a configuration is relatively more expensive when compared with the star network configuration. This is due, any existing node will act as a computer that will handle every application that it faces, and should be able to share resources on the existing network. In addition, this system is more suitable to use for systems that are not centralized (decentralized-system), which is not required to do a particular priority. Figure 8.2 Network topology ring Tree Network (Network Tree) In tree networks, there are several levels of nodes (node). Central or higher level node, another node can set a lower level. Data sent to the central node first. For example to move from a computer with a node-3 node kekomputer-7 as well as in the figure, the data must pass through node-3, 5 and node-6 before ending at the node-7. Keungguluan network tree model like this is, can the establishment of a group that is required at all times. For example, companies can form a group consisting of terminal accounts, as well as on other groups formed to terminal sales. The weakness is, if the node is higher then does not work, then the other group who are below it eventually also became ineffective. How the network is relatively slow tree Figure 8.3 Network topology tree Bus Network Another configuration is known as a bus-network, suitable for areas that are not too large. Each computer (each node) will be connected by a communication cable through an interface. Each computer can communicate directly with computers or other equipment contained within the network, in other words, all nodes have the same position. In this case, the network is not dependent on the existing computer center, so that when one device or one node is destroyed, the system can still operate. Each node has an existing address or nature itself. So that access to the data from one node, the user or the user simply mentioning the address of the node in question. Buses are the development of excellence network topology or adding new workstations can be done easily without disturbing other workstations. The weakness of this topology is that if there is interference along the center of the entire cable network would be disrupted. Figure 8.4 Network topology bus Plex Network (Network Combination) Network is a truly interactive, where every node has the ability to directly access not only to computers but also with other devices or nodes. In general, the network has a shape similar to a star network. Organization of existing data using the de-centralization, is to perform maintenance, use centralized facility. Figure 8.5 Network topology combinations Topology and logic are generally divided form the two types, namely: a. Broadcast Topology In simple terms can be described that is a host that sends data to all other hosts on the network media. b. Token Passing Topologies Set the data transmission to the host through the media by using the token that regularly rotates in a whole host. The host can only send data only if that host has a token. By this token, collision can be prevented. Factors - factors that need consideration for the selection of topology is as follows: · Course fee What is the most efficient system is needed within the organization. · Speed To what extent has the needed speed in the system. · Environment Such as electricity or factors - other environmental factors, influencing the type of hardware used. · Size Up to how big the size of the network. Does the network need a file server or a dedicated server. · Connectivity Does the other user who uses a laptop computer to access the network from various locations.

Currently have 0 comments:

Leave a Reply

Post a Comment