LAN Topologies and Networking Recommendations

239 views 3 pages ~ 775 words Print

Distributed computing systems are an important component of any expanding information technology. The technology used to make network linkages has an impact on the operation of any distributed system. The network topology is the organization of various computer elements such as links and nodes. There are different forms of network topology, each with its own set of pros and disadvantages. The most well-known example of network topology is LAN; LAN network topology often includes one or more physical links to other network devices (Oppenheimer 137). Therefore, it is essential to have Ethernet cables, cable connectors preferably RJ45, routers, hubs, desktop Gigabit Switches and network software for managing the system (server). In Niagara (Toronto), the demand for internet has been growing at a high rate with each household looking down to have a fast connection at a lower price. Such requirements can only be met when computer systems are interconnected in a particular manner that will correspond to the physical as well as legitimate needs of the network users.

Discussion

Physical network topology accentuates the hardware associated with the computing systems, including workstations, servers, remote terminals, and associated wiring between assets. There are five basic topologies that suit Niagara and they include:

Bus topology

Bus topology enables message transmission along the backbone connection. As the message arrives at each node (device), the node checks for destination address contained in the message to see if it coresponds to its own. If the address does not match, the device does nothing more. The key demerit of this network topology is that if the message conveyed matches the destination address, the message is displayed on all devices, which are connected to that cable. Thus, this type of network topology has issues with security of data being transmitted over the network as there will be many points of failure. Consequently, if the backbone connection does off, the entire network will go down (Oppenheimer 141).

Source: http://www.computerhope.com

Star topology

Star topology is one of the standard network topologies where nodes of the network are interconnected to a centralized hub. The major demerit of this network topology is that if the centralized hub goes down, all the computers connected to that hub will be disconnected. Therefore, there is a high dependency on the centralized hub; failure of the centralized hub renders the entire network inoperable (Lowe 13).

Source: http://www.computerhope.com

Ring topology

In a ring topology, all the nodes are connected to each other in a circle. The data passes one device to the next until it reaches its destination. A major demerit of this topology is that if a single device is switched off, the network will not work well since there will be a point of failure within the network (Held 221).

Source: http://www.computerhope.com

Mesh topology

In a mesh topology, each device is interconnected to the other devices, allowing the transmission to be distributed evenly if one of the connections goes down. The major demerit of this topology is the high chances of redundancy in network connections while the overall cost of setting the network is too high compared to other network topologies (Held 251).

Source: http://www.computerhope.com

Tree topology

Tree topology suits networks that are widely spread and vastly divided into branches. This topology is a combination of two or more bus and star topology connected. Each star network will have its local area connection where there will be a centralized server to which all the other nodes are connected directly. The major disadvantage of this topology is that the length of this network depends on the type of cables used and is dependent on the trunk which serves as the main backbone of the network (Lowe 15).

Source: http://www.computerhope.com

Conclusion

In summary, the performance of different types of topologies varies depending on the properties and priorities for the network. As discussed in this paper, there are five types of topologies; bus, star, ring, mesh, and tree topology. Each of the topologies has its advantages as well as disadvantages. Based on the inherent pros and cons of the network, it will be appropriate to adopt mesh topology since the failure of a device within the network would not interfere with the functionality of the network. Despite its overall high cost of setup, its performance would suit the demands and expectations of the Niagara residences.

Works Cited

Computer Hope’s Free Computer Help, www.computerhope.com

Held, Gilbert. Ethernet Networks: Design, Implementation, Operation, Management. Chichester [u.a.: Wiley, 2003. Print.

Lowe, Doug. Networking All-in-One Desk Reference for Dummies. Hoboken, N.J: Wiley, 2008. Internet resource.

Oppenheimer, Priscilla. Top-down Network Design, Second Edition. Cisco Press, 2005. Print.

June 06, 2023
Number of pages

3

Number of words

775

Downloads:

35

Writer #

Rate:

4.7

Expertise Network Security
Verified writer

Richard is the best writer for Data Science tasks, even if you have something really complex. I needed to do tasks on security matters and already had a draft. Sharing my ideas with Richard ended up in a perfect paper!

Hire Writer

Use this essay example as a template for assignments, a source of information, and to borrow arguments and ideas for your paper. Remember, it is publicly available to other students and search engines, so direct copying may result in plagiarism.

Eliminate the stress of research and writing!

Hire one of our experts to create a completely original paper even in 3 hours!

Hire a Pro