MCSE : Security Specialist
Mesh
A Mesh
topology Provides each device with a point-to-point connection to
every other device in the network. These are most commonly used in
WAN's, which connect networks over telecommunication links. Mesh
topologies use routers to determine the best path.
Mesh
networks provide redundancy, in the event of a link failure, meshed
networks enable data to be routed through any other site connected
to the network. Because each device has a point-to-point connection
to every other device, mesh topologies are the most expensive and
difficult to maintain.
Ring
In a
ring topology network computers are connected by a single loop of
cable, the data signals travel around the loop in one direction,
passing through each computer. Ring topology is an active topology
because each computer repeats (boosts) the signal before passing it
on to the next computer.
One
method of transmitting data around a ring is called token passing.
The token is passed from computer to computer until it gets to a
computer that has data to send.
If there
is a line break, or if you are adding or removing a device anywhere
in the ring this will bring down the network. In an effort to
provide a solution to this problem, some network implementations
(such as FDDI) support the use of a double-ring.
If the primary ring breaks, or a device fails, the secondary ring
can be used as a backup.
|