Home | Articles | About | Contact | Forum |
Saturday, December 21, 2024



Lunarpages.com Web Hosting

Mailing List

E-mail:
By Joining the mailing list you will be notified of site updates.


Show Your Support For
This Site By Donating:











Audience: Newbies - Self-Learners
Last Updated: 6/24/2011 6:08:51 PM
**All times are EST**



Basic Networking Topology

By Erik Rodriguez

This article describes common topologies used for networking. These are a very basic examples, and large networks often use a combination of two or more topologies.


Introduction

The term "topology" is used to describe the infrastructure of a network. It is a basic map or scheme of how the network is constructed. Viewing the topology of a network is a lot like looking at the map of city. You can see the central points or landmarks. Popular points of the cities are usually surrounded by a dense population of residents. The same is true for computer networks. The popular points (usually servers) are surrounded by residents (client machines) that connect to the server.

If you read a networking book about topology, they will probably cover the physical types of topologies like star, ring, bus, and mesh. While these were all commonly used topologies at one point in time, star is the primary topology used today. The others may be used in special circumstances or to connect a large group of routers. For example, the Internet backbones use a combination of ring and mesh topologies for a self-healing and reliable network.

Within a LAN, there are two main types of structures used within topologies. Server-based networks are the most common among businesses and large organizations. Peer-to-Peer (p2p) are popular among Internet networks and file sharing services. The tables below outline the pro's and con's of each.

Server-Based Networks


Pro's Con's
Easily managed security policy Files are not accessible if the server goes down
Files are centrally located Hackers target the server as a central point to gain full access of a network
Files are easy to backup Network servers can be expensive


The idea of this is to store files on a server. All other machines (clients) on a network access files from the server. Using a server-based network is also used because it is an efficient way to offer other services to clients such as firewall protection, DHCP, etc. For more information on servers see network and Internet servers.

Peer-to-Peer Networks


Pro's Con's
No server needed, equipment is cheap Security Policy can be hard to control
Network traffic is distributed among clients Backup is challenging
Files are scattered across different machines


Topology Structures

The diagrams below show star, ring, and mesh topologies. I will not cover bus topology because it is VERY rarely used. Remember that large networks often use a combination of these topologies depending on certain needs or projects. Peer-to-Peer has become popular among file sharing networks like Edonkey and WinMX. It is also used with BitTorrent.



The server-based network using a star topology is the most common. As you can see, the server has a high speed connection to a switch that feeds the client machines. Servers are designed to accommodate high traffic loads from clients. Although it is not shown in the diagram, servers are always protected using a firewall.





In a peer-to-peer (p2p) network, all files are shared among existing machine. There is no server, so all machines must sustain traffic loads from other clients. Bottle necking and network saturation are common problems among p2p networks. This is often helped with the use of software that offers bandwidth throttling to control the amount of bandwidth in and out of each machine.


As you can see in the mesh network, each machine has multiple connections with other machines. This is commonly used in large networks connect routers using the BGP protocol. Using a mesh topology increases the uptime of the network because every machine has another path for data if one or even two links goes down. This type of network is expensive and certain devices are not capable of this type of topology.



The ring topology is also commonly used to connect routers. Unlike the star, mesh, or p2p networks data is sent around the ring in a "round-robin" fashion. Rings can be configured in several different modes. While some rings only provide 1 physical wire connecting all machines, other rings can be configured with multiple wires to provide alternate paths in the event one wire goes down. This is called "self-healing" and is used in SONET networks.

Contact Us

If you found this information useful, click the +1 button



Your E-mail:


Subject:


Type verification image:
verification image, type it in the box

Message:


NOTE: this form DOES NOT e-mail this article, it sends feedback to the author.


TCP vs. UDP
Juniper SRX anti-spam filtering config
Windows Server 2008 Clustering Configuration
Windows 2008 R2 Network Load Balancing (NLB)
Extreme Networks: Downloading new software image
Juniper SRX save config to USB drive
Juniper SRX logout sessions
Extreme Networks Syslog Configuration
Command line drive mapping
Neoscale vs. Decru
Data Security vs. Data Protection
Juniper SRX Cluster Configuration
HOWTO - Create VLAN on Extreme Switch
Using a Non-local Colocation Facility
Linux Server Administration
IT Chop Shops
Flow Viewers: SFLOW, NetFLOW, and JFLOW
Exchange 2007 Back Pressure
IPtables open port for specific IP
Politics in IT Departments
HOWTO - Block Dropbox
Cisco IOS Cheat Sheet
Subnet Cheat Sheet
Design a DMZ Network
How DNS works
Firewall Configuration
Juniper SSG Firewalls
Server Management
Configuring VLANs
Runlevels in Linux
Server Clustering
SONET Networks
The Red Hat Network
Server Colocation
Complicated Linux Servers
Dark Fiber
Data Center Network Design
Firewall Types
Colocation Bandwidth




Copyright © 2002-2016 Skullbox.Net All Rights Reserved.
A division of Orlando Tech Works, LLC
By using this site you agree to its Terms and Conditions.
Contact Erik Rodriguez