• Tidak ada hasil yang ditemukan

View of BASIC TOPOLOGY OF COMPUTER NETWORK: A REVIEW

N/A
N/A
Protected

Academic year: 2023

Membagikan "View of BASIC TOPOLOGY OF COMPUTER NETWORK: A REVIEW"

Copied!
4
0
0

Teks penuh

(1)

65 INTERNATIONAL JOURNAL OF INNOVATION IN ENGINEERING RESEARCH & MANAGEMENT ISSN: 2348-4918

Peer Reviewed and Refereed Journal

VOLUME: 10, Special Issue 02, (IC-IMAF-2023) Paper id-IJIERM-X-II, January 2023 BASIC TOPOLOGY OF COMPUTER NETWORK: A REVIEW

Pooja Parmar

Assistant Professor, Shri Umiya Kanya Mahavidyalaya, Rangwasa (Rau), INDORE (M.P.)

Abstract - In computer network systems are interconnected with each other for the purpose of sharing digital information .computer networks is Networks is basically a set of devices connected through links. Computer network uses distributedprocessing in which task is divided among several. One of the most significant challenges to networks is to attack on theirresources.

This research paper highlights the concepts of computer networks. Network computer devices that originate, route and terminate the data are called network nodes. Nodes can includes host in personal computers, phones, servers as well as networking hardware. Computer networks support applications access to the World Wide Web, shared use of application and storages servers, printers and fax machines, and use of email and instant messaging applications.

Computer networks are used to perform a great numberof tasks by information sharing. The computer network enables to analyze, organize and disseminate the information that is essential to profitability. The rise of intranets and internets is the important aspect of computer networking. Intranets and internets are private business networks that are based on internet technology.

Keywords: Computer networks, Topology in computer Network, Advantages and disadvantages of computer networks.

1 INTRODUCTION

A computer network or data network is a telecommunications network that allows computers to exchangedata. In computer networks, networked computing devices pass data by data connections. The connections (network links) between nodes are established using cable media or wireless media. Internet is the best known Networking supports communication between two or more programs running on physically distant machines[1].

A computer network is a collection of computers, which are in some way connected such that they can exchange data between themselves and other computers on the network A set of computers exchanging information by common conventions called protocols over communication media. A computer network is simply computers wired together in a way that lets them share data and/or devices such as hard drives, CD-ROMs, fax-modems, printers, etc . A computer network is an interconnected collection of autonomous computers where interconnected means that the computers can exchange information and autonomous means that no computer can start, stop or control another computer connected to the network.[6] Network nodes devices originate, route and terminate the data. Nodes can include hosts in personal computers, phones, servers as well as networking hardware. Two devices are said to be networkedtogether when one device is able to exchange information with the other device, whether or not they have adirect connection with each other. Computer networks support applications access to the World Wide Web, shared use of application and storages servers, printers, and fax machines, and use of email and instantmessaging applications.

In the physical media computer network used to transmit their signal, the communications protocols to organize network traffic, size, topology and organizational intent The devices use general connection protocols beyond digital interconnections to connect with more devices.The sharing of data can occur through the two feasible ways physical cable media, such as fiber-optical cable, twisted pair etc. Wireless methods such as Wi-Fi, radio communication, and microwave transmission[7].

2 TOPOLOGY IN COMPUTER NETWORK 1) Common Physical Topologies

Physical and logical topologies can take various forms [6]. The most frequently used and the most important for understanding the Ethernet and Token Ring topologies are

 Bus topology.

 Ring topology.

 Star topology.

 Mesh topology.

(2)

66 INTERNATIONAL JOURNAL OF INNOVATION IN ENGINEERING RESEARCH & MANAGEMENT ISSN: 2348-4918

Peer Reviewed and Refereed Journal

VOLUME: 10, Special Issue 02, (IC-IMAF-2023) Paper id-IJIERM-X-II, January 2023

 Cellular topology a) Bus Topology

A bus topology is also known as line topologyis a type of network topologyin which all the devices in the network are connected by one central RJ-45 network cable or coaxial cable.Bus topology is network type in which every computer and network device is connected to a single cable .it transmits the data from one end to another in single direction .No bidirectional features is a bus topology. It is a multipoint connection and non robust topology. When a sender sends a message, all other computers can hear it , but only the receiver accepts it and other reject it. Bus topology is mainly suited for small network like LAN, etc.

In a bus topology, each computers communicates to another computer on the network independently. Every computer can share the networks total bus capabilities. The devices share the flow of data from one point to other in thenetwork[9].

Advantages – This type of topology is reliable in very small networks and it is easy to use and understand .This also requires the least amount of cables to connect the computers together and its easy to extend.

Disadvantage – Because of the fact that any computer in the network can transmit data at any time,network traffic can also slow down a bus. Also each connection between twocables can deteriorate the electric signal. In this type of topology the bus configuration can be difficult to find and can cause the whole network to stop working[4].

c) Star Topology

In star topology a central device is used with cables expanding in all directions. Each networked device is connected via a point-to-point link to the central device known as a hub or multiport repeater or switch. Moreover, star topologies can be nested within other stars to form tree or hierarchical network topologies. In star topology, electrical or electromagnetic signals travel from the networked device, up to its drop cable, to the switch, from there the signal is sent to other networks. The disadvantages of the bus topology and ring topology are removed in star topology. It is a commonly used and accepted model.

[2]

(3)

67 INTERNATIONAL JOURNAL OF INNOVATION IN ENGINEERING RESEARCH & MANAGEMENT ISSN: 2348-4918

Peer Reviewed and Refereed Journal

VOLUME: 10, Special Issue 02, (IC-IMAF-2023) Paper id-IJIERM-X-II, January 2023

Advantages- In a star topology, If one of the computers fails, it does not affect the others and this also contributes to its good performance. The center of a star network is a good place to diagnose network faults and if one computers fails the whole network is not distributed. Replacement of removal of devices can be easily done.

Disadvantages –This type of topology is expensive to install as its requires more cable length than other type of networking topologies Science the network depends upon thehub, or the central node if its fails to operate, than the whole networks also fails to operate[4].

3 RING TOPOLOGY:

Each host machine in this kind of topology links to precisely two other machines, forming a circularnetworkstructure. Whenever any host wants to interact with or send any message to a host that is not directly next toit, the data is routed via all intermediary hosts. The system, which gets the message of preceding system, passesit to the next system. The administrator may just require one additional cable to join one more host in thecurrent arrangement. It is similar to bus topology; the only difference is that its ends are connected. In this also data flow, take place in one direction only in a loop, which continues to move endlessly in the loop. However,by giving two connections between each network Node, it may be turned bidirectional, which is referred asDual ring topology. As both the ends are linked, there is no termination point. In it, data moves in clockwisedirection. When a ring topology with a high no. of nodes is utilised, many repeaters are needed for the reason that if someone wishes to transmit data to the final node in a ring topology with 90 nodes, the data must transitthrough 89 nodes before reaching the 90th node © 2019 JETIR March 2019, Volume 6, Issue 3 www.jetir.org (ISSN- 2349-5162)

[2]

Advantages – In this type of topology , the ring network offeres high performance for a small number of workstations or for larger networks where each station has a similar workload . The ring network can also span longer distance compared to other types of networks and these are also easily extendable.Unlike a bus topology. There is no signal loss in ring topologybecause the tokens are data packets that are pre generated at each node.

Disadvantages – This type of topologycost much money, time and efforts for its installation if one computers fails , it can affect the whole network and it is difficult to find fault in the network . The whole system is disrupted when computers are being addedor replaced in the network.This is much slower than an Ethernet network under normal load[4].

4. MESH TOPOLOGY

 In this topology multiple paths from one computer to another computer.

 Mesh does not contain the switch, hub or any central computer which acts as a central point of communication. It is mainly used in the wireless networks.

 The Internet is an example of the mesh topology[10].

(4)

68 INTERNATIONAL JOURNAL OF INNOVATION IN ENGINEERING RESEARCH & MANAGEMENT ISSN: 2348-4918

Peer Reviewed and Refereed Journal

VOLUME: 10, Special Issue 02, (IC-IMAF-2023) Paper id-IJIERM-X-II, January 2023 [2]

Advantages – This type of topology yields the greatest amount of redundancy in the event that one of these nodes fails where network traffic can be redirected to another node this is a good system when its comes to privacy because each computer can interact with each other anytime without the knowledge of the parties that are not involved in the conversation.

Disadvantages – The amount of cable requirements is very high and costly and large numbers of input/output ports are required[4].

5 CONCLUSION

In this paper tell about analytical study of different basic topologies which provide us a brief idea about each topology. Topology is reliable, scalable, flexible and effective. Only disadvantage in it is complexity of design, costly infrastructure when combining two or more different topologies. Computer Networks have forever changed the way of human lifestyles. Humans will work, play, and communicate using networks[7]. It seems that electronic communication can become a much more valuable networking.it still requires a great deal of concentrated effort and resources to get the people to use it. This problem should become increasingly minimized over the coming years as the technological innovations become more diffused throughout society [6].

REFERENCES

1. A Review paper “Anuj Kumar Bharti”, Department of computer science engineering Galgotias University Yamuna expressway Greater Noida Utterpradesh

2. Cherita L. Corbett, Raheem A. Beyah, John A.Copeland, Using Active Scanning to IdentifyWireless NICs, in: Proceedings of the 7th IEEEWorkshop on Information Assurance, U.S. MilitaryAcademy, West Point, NY, 21-23 June 2006.

3. Deepa,1Scholar, 2Assistant Professor,IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India.International Journal of Trend in Research and Development, Volume 2(5), ISSN 2394- 9333www.ijtrd.comIJTRD | Sep - Oct 2015Available Online@www.ijtrd.com 130

4. “Francis Pol Lim” Faculty of Business Administration ,AMA University #59, Panay Ave., Quezon City , Philippines , limfrancipol19@gmail.com

5. G. Edwards, “Methods Review paper Mixed-Method Approaches to Social Network Analysis,”ESRCNatl.

Cent. Res. Methods, 2010, doi: 10.1108/17465640910978391.

6. IEEE Computer Society, “IEEE Standard for Ethernet - Section Two,” IEEE Stand. Ethernet, 2012doi:

10.1109/IEEESTD.2012.6419735See discussions, stats, and author profiles for this publication at:

https://www.researchgate.net/publication/317101504

7. M.Benaiah Deva kumar and and B.Deepa assistant professor IT department, Shree Krishna Collage of Arts and Science, Coimbatore India

8. M. Jammal, T. Singh, A. Shami, R. Asal, and Y. Li, “Software defined networking: State of the art andresearch challenges,” Computer Networks. 2014, doi: 10.1016/j.comnet.2014.07.004.

9. MS Murli Nagesh Sankalp, MS, Pratiksha VijayChinchwade, MS. Rutuja RajkumarKagnole, MS. K.N. Rode.

Id IJRASET41553 ISSN:2321-9653

10. R. P. Richner, “Research Collection,” Brisk Bin. Robust Invariant Scalable Keypoints, 2011, doi:10.3929/ethz-a-010782581.

Referensi

Dokumen terkait

International Journal of Trend in Scientific Research and Development IJTSRD Volume 7 Issue 2, March-April 2023 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique

IJSR - INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH 183 Volume : 5 | Issue : 5 | May 2016 • ISSN No 2277 - 8179 | IF : 3.508 | IC Value : 69.48 Research Paper Medical Science Amitha