Senin, 20 September 2010

Computer Network Topology

Topology describes the structure of a network or how a network is designed. This pattern is very closely related to media access and delivery methods used. There were highly dependent topology with geofrapis location of each terminal, the quality control needed in the communication or messaging, as well as the speed of data transmission. In the definition of topology is divided into two, namely the physical topology (physical topology), which indicates the position of the physical cabling and topology of logic (logical topology) which shows how a medium accessible by the host.The physical topology is commonly used in building a network is:
Point to point (Point to Point).Networking ketitik point is the most simple networks but can be widely used. Once the simplicity of this network, which is often not considered as a network but only an ordinary communication. In this case, both nodes have the same level position, so that any node can initiate and control the relationship in the network. Data sent from one node another conclusion as the recipient directly, such as between terminals with the CPU.
Star Network (Star Network).In a star configuration, some existing equipment will be linked into a central computer. Existing controls will be concentrated at one point, such as workload and set the settings of existing resources. All links should be related to the central data channel if you want to target other conclusion. In this case, when the center was down, then all terminals may also be disrupted. Star network model is relatively very simple, so widely used by the parties of the banks that typically have many branches in different locations. With the existence of this star configuration, then all sorts of activities that exist in the branch offices it can be properly controlled and coordinated. In addition, the education world too much advantage of this star networks to control the activities of their proteges.Excess· Damage on one channel only affect the channel network and the station adrift.· Security level is high.· Hold on a busy network traffic.Additions and reductions · station can be done easily.Shortage· If the node was malfunctioning, then the entire network to a halt.HandlingNeed · middle nodes prepared spare.


Ring Networks (Ring Network)In this network there are several devices are connected to one another and ultimately form the chart as well as a ring. Ring network does not have a point that acts as a central regulator or data traffic, all nodes have the same level. Data sent will go through several nodes, so arrive at the destination node. In the present data, the network can move in one or two directions. However, existing data remain moving in one direction at a time. First, existing messages will be delivered from other ketitik point in one direction. When encountered a failure, for example, there is damage on the existing equipment, so existing data will be sent by way of a second, then the message is transmitted in the opposite direction, and could ultimately end up at the intended place. Such a configuration is relatively more expensive when compared with the star network configuration. This is due, any existing node will act as a computer that will handle every application that it faces, and should be able to share resources on the existing network. In addition, the system is more suitable to use for systems that are not centralized (decentralized-system), which is not required to do a particular priority.

Tree Network (Network Tree)In tree networks, there are several levels of nodes (node). Central or higher level node, another node can be set lower level. Data sent to the central node first. For example to move from a computer with a node-3 node kekomputer-7 as well as in the figure, the data must pass through node-3, 5 and node-6 before ending at the node-7. Keungguluan network tree model like this is, can the formation of a group that is required at all times. For example, companies can form a group consisting of terminal bookkeeping, as well as on other groups formed to terminal sales. The weakness is, if the node is higher then does not work, then the other group who are below it eventually also became ineffective. How the network is relatively slow tree

Bus NetworkAnother configuration is known as a bus-network, suitable for areas that are not too large. Each computer (each node) will be connected by a communication cable through an interface. Each computer can communicate directly with computers or other equipment contained within the network, in other words, all nodes have the same position. In this case, the network is not dependent on the existing computer center, so that when one device or one node is destroyed, the system can still operate. Each node has an existing address or nature itself. So that access to the data from one node, the user or the user simply mentioning the address of the node in question. Bus topology advantages are the development of a network or adding new workstations can be done easily without disrupting the other workstations. The weakness of this topology is that if there is interference along the center of the entire cable network will be disrupted.

Plex Network (Network Combination)Network is a truly interactive, where every node has the ability to directly access not only to computers but also with other devices or nodes. In general, this network has a shape similar to a star network. Organization of existing data using the de-centralization, is to perform maintenance, use centralized facility.

Topology and logic are generally divided form the two types, namely:a. Broadcast TopologyIn simple terms can be described that is a host that sends data to all other hosts on the network media.b. Token Passing TopologiesSet the data transmission to the host through the media by using the token that regularly rotates in a whole host. Hosts can only transmit data only if that host has a token. By token of this, collision can be prevented.
Factors - factors that need consideration for the selection of topology is as follows:· Course feeWhat is the most efficient system is needed within the organization.· SpeedTo what extent has the needed speed in the system.· EnvironmentSuch as electricity or factors - other environmental factors, influencing the type of hardware used.· SizeUp to how big the size of the network. Does the network need the file server or a number of specialized servers.· ConnectivityDoes the other user who uses a laptop computer to access the network from various locations.
Diponegoro Student Blogs Just another weblog prima \ 's blog

    
* Home
    
* About
«TYPES OF COMPUTER NETWORKS GSM Radio Network Planning Process » Computer Network Topology
Topology describes the structure of a network or how a network is designed. This pattern is very closely related to media access and delivery methods used. There were highly dependent topology with geofrapis location of each terminal, the quality control needed in the communication or messaging, as well as the speed of data transmission. In the definition of topology is divided into two, namely the physical topology (physical topology), which indicates the position of the physical cabling and topology of logic (logical topology) which shows how a medium accessible by the host. The physical topology is commonly used in building a network is:
Point-to-Point (Point to point). Networking ketitik point is the most simple networks but can be widely used. Once the simplicity of this network, which is often not considered as a network but only an ordinary communication. In this case, both nodes have the same level position, so that any node can initiate and control the relationship in the network. Data sent from one node another conclusion as the recipient directly, such as between terminals with the CPU.
Star Network (Star Network). In a star configuration, some existing equipment will be linked into a central computer. Existing controls will be concentrated at one point, such as workload and set the settings of existing resources. All links should be related to the central data channel if you want to target other conclusion. In this case, when the center was down, then all terminals may also be disrupted. Star network model is relatively very simple, so widely used by the parties of the bank which usually have many branches in different locations. With the existence of this star configuration, then all sorts of activities that exist in the branch offices it can be properly controlled and coordinated. In addition, the education world too much advantage of this star networks to control the activities of their proteges. Excess · Damage on one channel only affect the channel network and the station adrift. · Security level is high. · Hold on a busy network traffic. Additions and reductions · station can be done easily. Shortage · If the node was malfunctioning, then the entire network to a halt. Handling · Prepared Need backup middle node. 


Ring Networks (Ring Network)In this network there are several devices are connected to one another and ultimately form the chart as well as a ring. Ring network does not have a point that acts as a central regulator or data traffic, all nodes have the same level. Data sent will go through several nodes, so arrive at the destination node. In the present data, the network can move in one or two directions. However, existing data remain moving in one direction at a time. First, existing messages will be delivered from other ketitik point in one direction. When encountered a failure, for example, there is damage on the existing equipment, so existing data will be sent by way of a second, then the message is transmitted in the opposite direction, and could ultimately end up at the intended place. Such a configuration is relatively more expensive when compared with the star network configuration. This is due, any existing node will act as a computer that will handle every application that it faces, and should be able to share resources on the existing network. In addition, the system is more suitable to use for systems that are not centralized (decentralized-system), which is not required to do a particular priority.

 Tree Network (Network Tree)In tree networks, there are several levels of nodes (node). Central or higher level node, another node can be set lower level. Data sent to the central node first. For example to move from a computer with a node-3 node kekomputer-7 as well as in the figure, the data must pass through node-3, 5 and node-6 before ending at the node-7. Keungguluan network tree model like this is, can the formation of a group that is required at all times. For example, companies can form a group consisting of terminal bookkeeping, as well as on other groups formed to terminal sales. The weakness is, if the node is higher then does not work, then the other group who are below it eventually also became ineffective. How the network is relatively slow tree

Bus NetworkAnother configuration is known as a bus-network, suitable for areas that are not too large. Each computer (each node) will be connected by a communication cable through an interface. Each computer can communicate directly with computers or other equipment contained within the network, in other words, all nodes have the same position. In this case, the network is not dependent on the existing computer center, so that when one device or one node is destroyed, the system can still operate. Each node has an existing address or nature itself. So that access to the data from one node, the user or the user simply mentioning the address of the node in question. Bus topology advantages are the development of a network or adding new workstations can be done easily without disrupting the other workstations. The weakness of this topology is that if there is interference along the center of the entire cable network will be disrupted.

Plex Network (Network Combination)Network is a truly interactive, where every node has the ability to directly access not only to computers but also with other devices or nodes. In general, this network has a shape similar to a star network. Organization of existing data using the de-centralization, is to perform maintenance, use centralized facility.

Topology and logic are generally divided form the two types, namely:a. Broadcast TopologyIn simple terms can be described that is a host that sends data to all other hosts on the network media.b. Token Passing TopologiesSet the data transmission to the host through the media by using the token that regularly rotates in a whole host. Hosts can only transmit data only if that host has a token. By token of this, collision can be prevented.
Factors - factors that need consideration for the selection of topology is as follows:· Course feeWhat is the most efficient system is needed within the organization.· SpeedTo what extent has the needed speed in the system.· EnvironmentSuch as electricity or factors - other environmental factors, influencing the type of hardware used.· SizeUp to how big the size of the network. Does the network need the file server or a number of specialized servers.· ConnectivityDoes the other user who uses a laptop computer to access the network from various locations.