Advantages And Disadvantages Of Star, Bus, And Mesh Topologies

Advantages and Disadvantages of Star Topology

Star Topology

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Figure 1. STAR TOPOLOGY

Source: (created by Author)

The Advantages of the star topology are:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
  • In the star topology the server is located on the center and is connected to the client machines individually. Hence, the performances of the star topology is better when compare with the other topologies.
  • The server in the star topology is located at the center and hence, the monitoring procedures of the network can be performed very easily and also very efficiently.
  • The expansion of the network implemented in the star topology can be very easy. Any number of additional nodes can be easily attached with the already existing network.
  • The client machines are detached from each other in this topology. Hence, the failure of a single node would not hamper the whole of the network.
  • The disadvantages of the Star topologies are:
  • As the server is located on the central node the whole system is dependent on the central node. This dependency of high level on the central node might hamper the efficiency of the system.
  • Due to the over dependency on the central node the system might fail totally if the central node of the network fails for any reason.
  • The topology is a bit expensive and the cost of implementation of the technology is on the higher side.
  • Too much dependency on the central node.

Bus Topology

Figure 2. BUS TOPOLOGY

Source: (created by Author)

The advantages of the Bus topology are:

  • The implementation process and the cost of implementation of the Bus topology is very easy and very cheap.
  • The expansion of the topology is very easy. More than 50 systems can be easily accommodated in the system having a bus topology.
  • The design of the topology is linear and hence, the efficiency of the topology is very high.

Disadvantages of the Bus topology:

  • The termination of the system requires efficient dumping of the signals.
  • The maintenance cost of the system increases significantly with the increase of time.
  • The topology is inefficient for the networks where the daily traffic throughout the network is very high.
  • The security provide by the topology is also very inefficient as the network is accessed by all the clients in a linear structure and the data are that are send by the server to a particular client are generally available to all the clients within the network.

Mesh Topology  

Figure 3. MESH TOPOLOGY

Source: (created by Author)

The advantages of the mesh topology are:

  • All the clients and the servers of the mesh topology are interconnected with each other with a number of links. There is a link in between each and every server and client machines. Hence, the data transmission in the network takes place simultaneously.
  • The failure of a single node or a single node does not affect the system to great extent. The data can easily flow through an alternate node or an alternate link.
  • The expansion process and the modification procedure of the network when required can be dones easily. It would not require much of an alteration of the actual network that was implemented originally.

The disadvantages of the mesh topology are:

  • The chances of redundancy in the mesh topology are very high.
  • The cost of implementation of the mesh topology is very high and in addition to this the implementation process of the mesh topology is also very complex.
  • The Mesh topology is also very hard to maintain.

Figure 4. DATA TRANSFER

Source: (created by Author) 

The data transfer in the networks takes place by transferring the data packets from one node to another. In addition to this the data packets also have through the different layers of anetwork in a single machine before they are ready to be transferred. At first in the sender machine the data packets are generated in the application layer. The data traverses the through the different layers and finally arrives at the network layer where the data would transported to the other machines. During the traversal through all the network layers, some additional bits are added to the data packets every time the data moves down from the layer to the layer below it. This process is known as the process of data encapsulation.

After the data packet is sent from the sender machine into the network, the recipient would have to receive the data packets. After the reception process is over, the data is kept in the network layer. In the recipient machine, the data travels from the network layer to the application layer. IN this machine every time the data packets move up, the extra bits that were added in each layer of the sender machine are deleted from the data packet in each layer of the recipient machine. This process of the removal of the extra bit from the data packets is known as the process of decapsulation. After the decapsulation process is completed the actual data is obtained by the application layer.

The techniques of mutilplexing and demultiplexing are dissimilar to the techniques that involve the encapsulation and the decapsulation of data. The multiplexing and the demutiplexing technique are applied on the signals of the network, while the encapsulation and the decapsulation techniques are appied to the data that is flowing through the network. In addition this, the multiplexing and the demultiplexing techniques are used for simplifying the signals of the network, whereas the encapsulationand the decapsulation techniques are usually involved with ensureing the data security within the network. They ensure that the data ment for a single machine can not be received by some other machine.

It is given that,

B= 6.8 MHz is the bandwidth.

SNR= 132 is the signal to noise ratio

C= Bit Rate.

C=B log (1+SNR) = 6.8×106 log2 (1+132) = 6.8×106 log2 133 = 48 Mbps.

Hence, the bit rate is 48 Mbps.

Let, L be the number of signals

Therefore, C = 2 x B x log2 (L)

0r, 48= 2×6.8xlog2L

Or, log2 L=48/(6.8×2)

Or, log2 L= 3.56 0r 4 (approx)

Or, L = 24= 16.

Advantages and Disadvantages of Bus Topology

There are 16 level of signals.

The OSI model and the TCP/IP model are almost similar to each other but are there are some differences in the functionality of both the models. The number layers present the OSI model are more than that of the TCP/IP model. Hence the OSI model provides more functionality and more number of options to the network. The OSI model also provides enhancement of the security of the network. The OSI model involves a number of authentication procedures due to the number of layers in the model and also some extra functions due to the presence of the extra layers in the network model.

Although the OSI model is more efficient than the TCP/IP model, yet the TCP/IP model is preferred over the TCP/IP model. This because the OSI model is efficient theoretically, but the practical implementation of the model is very difficult, and in addition to this the TCP/IP model is easier to implement practically and also the TCP/IP model is collaborated with the reputed models.

The main advantages of the OSI model are that they can interpret functions at each level of the model and also they provide with a number of options to the networks. But the main disadvantage of the OSI model is that they are very difficult to implement.

The main advantages of the TCP/IP model are that they are very easy to implement and have more preferences. But the main disadvantages of this model are that they are slow are than the other model and also the security of data is less efficient.

It is given that,

 The frame size is 5 million bits.

The propagation speed is 2.2x 108 m/s

The distance is 1900 Km.

Length of the link = 1900 Km = 1900 x 103 meters.

Bandwidth of the network = 8 x 106 bps

The queuing time is 10 x 3.5 mS = 35 mS.

The delay in processing is 1.8 x 10 mS = 18 mS.

 The transmission time is 5 x 106 /8 mS = 62500 =.625 s

The propagation time = 1900 x 103 / 2.2x 108 uS = 8 uS

Total delay time = 35 + 18 + .08 + 62500 = 62551.08 mS = .63 sec

The total delay time is .63 sec and the dominant component is the transmission delay and the negligible component is the propagation time.

Figure 5. The POP 3 State diagram

Source: (created by Author)

The POP 3 protocol has four states:

Authorization: The authorization of an established connection takes place.

Transaction: The transactions of the authorized connection takes place.

Update: The transaction are updated.

Closed: After completion of the update procedure the POP 3 is closed.

Agnoloni, T., & Pagallo, U. (2014). The case law of the italian constitutional court between network theory and philosophy of information. In 2 ND INTERNATIONAL WORKSHOP ON “Network Analysis in Law” (Vol. 91, No. F1, pp. 94-9).

An, H., Zhong, W., Chen, Y., Li, H., & Gao, X. (2014). Features and evolution of international crude oil trade relationships: A trading-based network analysis. Energy, 74, 254-259.

Becker, T., Meyer, M., & Windt, K. (2013, September). A network theory approach for robustness measurement in dynamic manufacturing systems. In 17th Annual Cambridge International Manufacturing Symposium, September, Cambridge.

Deo, N. (2016). Graph theory with applications to engineering and computer science. Courier Dover Publications.

Gao, C., Sun, M., & Shen, B. (2015). Features and evolution of international fossil energy trade relationships: A weighted multilayer network analysis. Applied Energy, 156, 542-554.

Goodall, K. T., Newman, L. A., & Ward, P. R. (2014). Improving access to health information for older migrants by using grounded theory and social network analysis to understand their information behaviour and digital technology use. European journal of cancer care, 23(6), 728-738.

Groenewegen, P., & Moser, C. (2014). Online communities: Challenges and opportunities for social network research. In Contemporary Perspectives on Organizational Social Networks (pp. 463-477). Emerald Group Publishing Limited.

Haque, A., & Mantode, K. L. (2013, June). Governance in the Technology Era: Implications of Actor Network Theory for Social Empowerment in South Asia. In International Working Conference on Transfer and Diffusion of IT (pp. 375-390). Springer Berlin Heidelberg.

Kärrholm, M. (2013). Building type production and everyday life: rethinking building types through actor-network theory and object-oriented philosophy. Environment and Planning D: Society and Space, 31(6), 1109-1124.

Li, H., Fang, W., An, H., & Yan, L. (2014). The shareholding similarity of the shareholders of the worldwide listed energy companies based on a two-mode primitive network and a one-mode derivative holding-based network. Physica A: Statistical Mechanics and its Applications, 415, 525-532.

Manshaei, M. H., Zhu, Q., Alpcan, T., Bac?ar, T., & Hubaux, J. P. (2013). Game theory meets network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25.

Mpazanje, F., Sewchurran, K., & Brown, I. (2013). Rethinking information systems projects using actor-network theory–perspectives from a developing country. The Electronic Journal of Information Systems in Developing Countries, 58.

Rucco, M., Castiglione, F., Merelli, E., & Pettini, M. (2016). Characterisation of the idiotypic immune network through persistent entropy. In Proceedings of ECCS 2014 (pp. 117-128). Springer International Publishing.

Siemens, G. (2014). Connectivism: A learning theory for the digital age.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Services offered

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code ESSAYHELP