Types of Topologies in Network Environments

Home > Blogs > Cisco > Types of Topologies in Network Environments

Types of Topologies in Network Environments

Like This Blog 0Mark Jacob
Added by April 10, 2019

This content is from our CompTIA Network + Video Certification Training Course. Start training today!


Topologies are something a networking professional using when they begin setting up their environment. Therefore, it’s important to define what exactly a topology is.

A topology is defined as how the physical media links to the network nodes. From a human perspective, a topology is how does a user get to Google, Bing, or whatever they’re trying to search for on the internet. What mechanisms or technology allows this to occur?

Types of Topologies:

  • Bus
  • Ring
  • Star
  • Mesh

 

Let’s examine some of the options.

Bus Topology:

Initial technology provided us with the Bus Topology. A Bus is a network setup where all the devices attach to the same Local Area Network (LAN) thicknet cable.

One of the downsides with bus topology is, if one node is transmitted, all devices connected to the bub topology would read the transmission. In other words, all the machines had to listen and then decide if they care about this, if they didn’t, they dumped the message. Today, a Bus Topology is not very efficient use of CPU cycles and bandwidth.

Ring Topology:

Ring topology is very obvious from the diagram above. Data travels in a ring around the circle. This diagram shows a dual ring which is common because if there was a breakage or outage, the other users will be able to continue transmitting packets. If there’s a dual ring and I have an outage, then, I can fix the issue while connectivity continues. At no time am I losing user access to the network time.

You may also like:  Understanding Network Cable Testers

In fact, that’s one of the rules we get in troubleshooting, restore connectivity quickly and try to avoid downtime.

Star Topology:

In a Star Topology, there’s physical layout of your network and logical layout of your network.

It’s unlikely that you’ll walk in any boardroom, or cubicle farm and see a network that’s laid out exactly the way it is in the above diagram. In fact, if you were able to peel the lid back off of a room and hover over it in a balloon. It doesn’t really look like a star.

Physically, this doesn’t look like a star but notice what gives it away, single point of failure.

Single Point of Failure (SPoF)

A Single Point of Failure is bad from the standpoint of a network admin because if something’s going to break, your single point of failure goes down and so does everybody else is.

Mesh Topology:

If you see a network diagram like this, think about the layout, there may be a widely disparate geographic regions that are far apart with many connections.

In fact, this could be a sample CompTIA Network + exam question. It would be presented as a scenario: “You’re the network admin for this company and we have five sites. We want to connect them all. What should we choose?” FULL MESH. Now the question is, “how many total connections do I need to have full mesh?”

You may also like:  Understanding Fiber Optic in Network Environments

Well, here’s option one, count them. You would need to count every possibility where the line on the diagram intersects with another line of circle. It would be easily to skips a connection or accidently count a connection twice.

Here’s a better way to find the answer:

You just need to know a simple formula. Full mesh is the total number of nodes (circles) Looks like this. Number of nodes (times the number of nodes minus one) over two.

For this example, we have 5 nodes.

5 * 5 ‑ 1 is 4 divided by 2. That’s 20. Which equals10.

 

I didn’t have to count anything.

Those are various topology types that you need to be familiar with.

Until next time….

Mark Jacob
Cisco and CompTIA Network + Instructor – Interface Technical Training
Phoenix, AZ

Video Certification Training: CompTIA Network +

 

Videos You May Like

Agile Methodology in Project Management

0 103 0

In this video, you will gain an understanding of Agile and Scrum Master Certification terminologies and concepts to help you make better decisions in your Project Management capabilities. Whether you’re a developer looking to obtain an Agile or Scrum Master Certification, or you’re a Project Manager/Product Owner who is attempting to get your product or … Continue reading Agile Methodology in Project Management

Creating Users and Managing Passwords in Microsoft Office 365

0 391 3

In this Office 365 training video, instructor Spike Xavier demonstrates how to create users and manage passwords in Office 365.

Detailed Forensic Investigation of Malware Infections – April 21, 2015

3 393 3

In this IT Security training video, Security expert Mike Danseglio (CISSP / CEH) will perform several malware investigations including rootkits, botnets, viruses, and browser toolbars.

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.