Networking Technologies: Analysis and Design for Beta Communication
VerifiedAdded on 2020/06/06
|41
|8806
|131
Report
AI Summary
This report delves into various networking technologies, focusing on the design and implementation of a Local Area Network (LAN) for Beta Communication, a company with three buildings. It begins by discussing the benefits and constraints of different networking systems, types, and topologies, including Peer-to-Peer, Client-Server, Cloud Networking, and Virtual LANs, alongside network types like PAN, MAN, and WAN. The report analyzes the requirements for Beta Communication, proposing a LAN solution. It evaluates the impact of current network technology, communication standards, and protocols, including the role of software and hardware components, server types, and workstation-network interdependence. The report outlines a high-level LAN design, detailing implementation, testing, and analysis of results. It also provides recommendations for network enhancements and a maintenance schedule. The report covers topics like LAN interconnecting media, Voice over IP, Quality-of-Service, and securing LAN networking. The objective is to provide a comprehensive analysis and practical guide for designing and maintaining a network system, with a focus on meeting the specific needs of the company.

Networking Technologies 1
Networking Technologies
Student's Name:
Instructor's Name:
Date:
Networking Technologies
Student's Name:
Instructor's Name:
Date:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Networking Technologies 2
Contents
Task 1...........................................................................................................................................................3
1.1 Discuss the benefits and constraints of different networking systems, types and topologies.
Analyse and clearly identify the requirements of the system for this network in order to convince the
management of the given case study company......................................................................................3
Personal Area Network ..................................................................................................................7
Local Area Network........................................................................................................................7
LAN interconnecting media:...........................................................................................................8
Voice over IP-..................................................................................................................................8
Metropolitan Area Network...........................................................................................................9
Wide Area Network........................................................................................................................9
Proposed Network for Beta Communication.........................................................................................10
1.2 Evaluate the impact of current network technology, communication and standards for the given
case study company. .............................................................................................................................15
1.3 Discuss how protocols enable the effective utilization of different networking systems................18
Task 2.........................................................................................................................................................20
2.1 Discuss the role of software and hardware components for the given company case study. ........21
Software Requirements................................................................................................................23
2.2 Discuss server types and selection requirement for the given company case study.......................25
2.3 Discuss the inter-dependence of workstation hardware with network components......................26
Task 3.........................................................................................................................................................29
A high level LAN design for Beta Communication would appear as follows:.........................................29
...................................................................................................................................................................29
Task 4.........................................................................................................................................................34
4.1 Implement a network system based on the proposed design. .......................................................34
4.2 Test network systems to meet user requirements. .......................................................................37
4.3 Document and Analyse test results against expected results..........................................................38
...............................................................................................................................................................39
4.4 Recommend potential enhancement for the networked systems...................................................39
4.5 Design a maintenance schedule to support the network system....................................................39
References.................................................................................................................................................41
Contents
Task 1...........................................................................................................................................................3
1.1 Discuss the benefits and constraints of different networking systems, types and topologies.
Analyse and clearly identify the requirements of the system for this network in order to convince the
management of the given case study company......................................................................................3
Personal Area Network ..................................................................................................................7
Local Area Network........................................................................................................................7
LAN interconnecting media:...........................................................................................................8
Voice over IP-..................................................................................................................................8
Metropolitan Area Network...........................................................................................................9
Wide Area Network........................................................................................................................9
Proposed Network for Beta Communication.........................................................................................10
1.2 Evaluate the impact of current network technology, communication and standards for the given
case study company. .............................................................................................................................15
1.3 Discuss how protocols enable the effective utilization of different networking systems................18
Task 2.........................................................................................................................................................20
2.1 Discuss the role of software and hardware components for the given company case study. ........21
Software Requirements................................................................................................................23
2.2 Discuss server types and selection requirement for the given company case study.......................25
2.3 Discuss the inter-dependence of workstation hardware with network components......................26
Task 3.........................................................................................................................................................29
A high level LAN design for Beta Communication would appear as follows:.........................................29
...................................................................................................................................................................29
Task 4.........................................................................................................................................................34
4.1 Implement a network system based on the proposed design. .......................................................34
4.2 Test network systems to meet user requirements. .......................................................................37
4.3 Document and Analyse test results against expected results..........................................................38
...............................................................................................................................................................39
4.4 Recommend potential enhancement for the networked systems...................................................39
4.5 Design a maintenance schedule to support the network system....................................................39
References.................................................................................................................................................41

Networking Technologies 3
Task 1
1.1 Discuss the benefits and constraints of different networking systems, types and
topologies. Analyse and clearly identify the requirements of the system for this
network in order to convince the management of the given case study
company.
Computer networks can be categorized into different types. All networks are characterized based
on the type of activities carried out by a company. The actual size of a network depends on its
geographic area, the total number of computers and people who are a part of the organization’s
network. Networks can include anything like a room with a handful of computers or a million
devices spread across the world. Networks are differentiated based on its size.
Different Types of Networking Systems
Peer to Peer network is the simplest form of network. This is where two or more computers are
connected together. These computers share resources without the help of a server. The P2P
networks can have ad hoc connections, where computers transfer files through an Universal
Serial Bus. P2P networks can be both simple or complex. In the grander scale, they need special
protocols and customized applications for the communication.
Benefits of P2P
1) These networks don’t need a network operating system
2) These networks don’t need expensive servers
3) These networks are easy to setup and they don’t need specialist staff
Drawbacks of P2P
1) It is difficult to take centralized backups
2) It is not possible to organize the network centrally
Task 1
1.1 Discuss the benefits and constraints of different networking systems, types and
topologies. Analyse and clearly identify the requirements of the system for this
network in order to convince the management of the given case study
company.
Computer networks can be categorized into different types. All networks are characterized based
on the type of activities carried out by a company. The actual size of a network depends on its
geographic area, the total number of computers and people who are a part of the organization’s
network. Networks can include anything like a room with a handful of computers or a million
devices spread across the world. Networks are differentiated based on its size.
Different Types of Networking Systems
Peer to Peer network is the simplest form of network. This is where two or more computers are
connected together. These computers share resources without the help of a server. The P2P
networks can have ad hoc connections, where computers transfer files through an Universal
Serial Bus. P2P networks can be both simple or complex. In the grander scale, they need special
protocols and customized applications for the communication.
Benefits of P2P
1) These networks don’t need a network operating system
2) These networks don’t need expensive servers
3) These networks are easy to setup and they don’t need specialist staff
Drawbacks of P2P
1) It is difficult to take centralized backups
2) It is not possible to organize the network centrally
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Networking Technologies 4
3) Performance issues are common
4) There are less secure
Client-Server Networks allow files to be stored in a specialized machine called the server. Data
is never stored in the hard disk of each workstation. The servers are designed to provide data to
remote clients whenever required. Indeed, Beta Communications requires a similar kind of
network. Where several clients are able to communicate, transfer files and store data centrally in
servers.
Benefits of Client-Server Networks
1) Files are stored centrally
2) Network devices can be controlled centrally
3) Backups and network security is never a problem
Drawbacks of Client-Server Networks
1) A specialized network operating system is required
2) Network peripherals can be very expensive
3) A trained network team is required
4) Network failures can be expensive and difficult to troubleshoot
Cloud Networking is a new and an upcoming concept where clients are allowed to access and
connect with devices that are located across the globe. Cloud gives clients the freedom to pay-as-
they-use. This form of networking helps all business technologies.
Benefits of cloud networking
3) Performance issues are common
4) There are less secure
Client-Server Networks allow files to be stored in a specialized machine called the server. Data
is never stored in the hard disk of each workstation. The servers are designed to provide data to
remote clients whenever required. Indeed, Beta Communications requires a similar kind of
network. Where several clients are able to communicate, transfer files and store data centrally in
servers.
Benefits of Client-Server Networks
1) Files are stored centrally
2) Network devices can be controlled centrally
3) Backups and network security is never a problem
Drawbacks of Client-Server Networks
1) A specialized network operating system is required
2) Network peripherals can be very expensive
3) A trained network team is required
4) Network failures can be expensive and difficult to troubleshoot
Cloud Networking is a new and an upcoming concept where clients are allowed to access and
connect with devices that are located across the globe. Cloud gives clients the freedom to pay-as-
they-use. This form of networking helps all business technologies.
Benefits of cloud networking
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Networking Technologies 5
1) Cloud networks can save lots of money. They can follow zero in-house hardware
investments.
2) Cloud networks are reliable and much more consistent
3) Cloud networks offer an strategic edge to various companies
Drawbacks of cloud networking
1) With more clients, cloud service providers are likely to face greater downtimes
2) Security is always an issue with cloud computing
3) Clients or network managers have limited control over cloud networks
Virtual LAN
Virtualized networks help in cutting down the cost of network devices. These networks
are known for its agility and efficiency. Virtual networks are useful when there is plenty of CPU
intense processing and very little dependence on dedicated hardware. Web application firewalls
are ideal forms of virtualized networks.
Benefits of Virtual Networks
1) Resources can be shared easily
2) Network efficiency can be maintained
3) Virtual networks are easy to define
4) It is easy to extend virtual networks using Ethernet mode LAN s. In the longer run, Beta
Communications can shift to virtualized networks
1) Cloud networks can save lots of money. They can follow zero in-house hardware
investments.
2) Cloud networks are reliable and much more consistent
3) Cloud networks offer an strategic edge to various companies
Drawbacks of cloud networking
1) With more clients, cloud service providers are likely to face greater downtimes
2) Security is always an issue with cloud computing
3) Clients or network managers have limited control over cloud networks
Virtual LAN
Virtualized networks help in cutting down the cost of network devices. These networks
are known for its agility and efficiency. Virtual networks are useful when there is plenty of CPU
intense processing and very little dependence on dedicated hardware. Web application firewalls
are ideal forms of virtualized networks.
Benefits of Virtual Networks
1) Resources can be shared easily
2) Network efficiency can be maintained
3) Virtual networks are easy to define
4) It is easy to extend virtual networks using Ethernet mode LAN s. In the longer run, Beta
Communications can shift to virtualized networks

Networking Technologies 6
Types of Virtual LAN or VLAN
1. Layer 1 VLAN membership by Port:
this would be based on ports which belongs to VLAN like that of 1, 2 and 4 port this type
of LAN would not be providing mobility to the user like if they are moving somewhere else then
they would not be able to access it.
2. Layer 2 VLAN membership by MAC address:
this would be based on MAC that of the workstation all the address in this would be
interfacing into card whenever workstation is moving.
Drawbacks of Virtual Networks
1) Designing and constructing virtual networks is difficult
2) Security implementations are difficult
Clustered networks are a superset of centralized network systems. Even client-server
networks are a form of centralized networks. Here, a group of machines are connected together
with a centralized server. The server helps with storing files and handling communication. It is
possible to include as many clients as required in a clustered/centralized networking system.
Different types of network are:
1) Personal area network (PAN)
2) Local area network (LAN)
3) Metropolitan area network (MAN)
4) Wide area network (WAN)
Types of Virtual LAN or VLAN
1. Layer 1 VLAN membership by Port:
this would be based on ports which belongs to VLAN like that of 1, 2 and 4 port this type
of LAN would not be providing mobility to the user like if they are moving somewhere else then
they would not be able to access it.
2. Layer 2 VLAN membership by MAC address:
this would be based on MAC that of the workstation all the address in this would be
interfacing into card whenever workstation is moving.
Drawbacks of Virtual Networks
1) Designing and constructing virtual networks is difficult
2) Security implementations are difficult
Clustered networks are a superset of centralized network systems. Even client-server
networks are a form of centralized networks. Here, a group of machines are connected together
with a centralized server. The server helps with storing files and handling communication. It is
possible to include as many clients as required in a clustered/centralized networking system.
Different types of network are:
1) Personal area network (PAN)
2) Local area network (LAN)
3) Metropolitan area network (MAN)
4) Wide area network (WAN)
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Networking Technologies 7
There are few network types for general purpose too. This includes the process of sending
files from one system to another or the internet. This includes the following:
1) Storage area network (SAN)
2) Enterprise Private Network (EPN)
3) Virtual Private Network (VPN)
Personal Area Network
Personal area network is an organized network around a particular individual. The individual is
bound within a single building. The building could be anything like his residence or office. An
ideal PAN is built using one or more peripheral devices, telephone and computers. If several
people are using the network, it is also known as home area network (HAN).
Local Area Network
Local Area Network comprises of computers in a specific site. Often, individual office
building invest on LAN. The LAN is extremely helpful in sharing printers, data storage and other
resources. LANs can be established very easily, using hardware devices like Ethernet cables,
network adapters and hubs. A very small LAN comprises of 2 machines, whereas there can be
huge LAN structures that connect numerous computers. LAN relies on wired connections that
ensure high security and speed. LANs are best used in single site applications where people need
to share resources among a known group and not the entire world.
LAN Data Communication Equipment
Switches- Repeaters- Bridges- Hubs- Routers-
This would be
allowing different
It would be
regenerating the
It would be
creating an
It would be
connecting
This would be
allowing many
There are few network types for general purpose too. This includes the process of sending
files from one system to another or the internet. This includes the following:
1) Storage area network (SAN)
2) Enterprise Private Network (EPN)
3) Virtual Private Network (VPN)
Personal Area Network
Personal area network is an organized network around a particular individual. The individual is
bound within a single building. The building could be anything like his residence or office. An
ideal PAN is built using one or more peripheral devices, telephone and computers. If several
people are using the network, it is also known as home area network (HAN).
Local Area Network
Local Area Network comprises of computers in a specific site. Often, individual office
building invest on LAN. The LAN is extremely helpful in sharing printers, data storage and other
resources. LANs can be established very easily, using hardware devices like Ethernet cables,
network adapters and hubs. A very small LAN comprises of 2 machines, whereas there can be
huge LAN structures that connect numerous computers. LAN relies on wired connections that
ensure high security and speed. LANs are best used in single site applications where people need
to share resources among a known group and not the entire world.
LAN Data Communication Equipment
Switches- Repeaters- Bridges- Hubs- Routers-
This would be
allowing different
It would be
regenerating the
It would be
creating an
It would be
connecting
This would be
allowing many
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Networking Technologies 8
device on same
network to
communicate
signal over same
network if it is
corrupting or
weakening thus
this would be
extending the
signal which is
transmitted again
in network.
aggregation of
signal which is
coming from
multiple
communication
device this
would be called
to as network
bridging.
various
computer
device or other
networks
together while
it is having no
routing tables
or intelligence.
networks to
communicate with
each other.
LAN interconnecting media:
UTP STP Coaxial Fiber optic
Un-shielded media
which would be
including the twisted
pair of cables it is of
four types.
This is the shielded
twisted pair of cable
which is protecting it
from any damage or
interference.
Which is another
type of electrical
cable having its
inner conductor
surrounded by
tubular insulating
layer
It is also like electrical cable
but having more than one
optical fibers which is
carrying light
Voice over IP-
The full form would be voice over internet protocol which is helping into delivery of
voice communication and multimedia over the IP network of internet.
Video on demand-
device on same
network to
communicate
signal over same
network if it is
corrupting or
weakening thus
this would be
extending the
signal which is
transmitted again
in network.
aggregation of
signal which is
coming from
multiple
communication
device this
would be called
to as network
bridging.
various
computer
device or other
networks
together while
it is having no
routing tables
or intelligence.
networks to
communicate with
each other.
LAN interconnecting media:
UTP STP Coaxial Fiber optic
Un-shielded media
which would be
including the twisted
pair of cables it is of
four types.
This is the shielded
twisted pair of cable
which is protecting it
from any damage or
interference.
Which is another
type of electrical
cable having its
inner conductor
surrounded by
tubular insulating
layer
It is also like electrical cable
but having more than one
optical fibers which is
carrying light
Voice over IP-
The full form would be voice over internet protocol which is helping into delivery of
voice communication and multimedia over the IP network of internet.
Video on demand-

Networking Technologies 9
under this type of method the viewer is having choice from various entertainment films or
other video which is by means of PC or TV systems that too on their own demand system.
Audio and video streaming-
this is the compressed form of audio or video that is sent over internet and then played on
immediate bases rather saving and then watching or listening them all.
Discuss Quality-of-Service in LAN and how they can be implemented
This would be diversified methods which is having predictable network behaviour and
then the performance like that of Voice-over-IP or video-on-demand.
Differentiated Service Code Point, 802.1q frame tagging, IP precedence
In the tag control information which is TCI there is 1st three bits which would be giving 8
priority level with defined priority of user. Like that of IEEE 802.1p is defining 3 priority of
user.
Bandwidth- this was traditionally defined to as bits per second ,like that of mega bite per second
(Mbps).
Latency- this could be defined to as time taken for one packet of data to reach another designated
point in another point.
Jitter- thus jitter would be the variation between two latency from packet flowing one system to
the other this will be resulting into network congestion and timing changes.
Packet loss- while one packet is travelling from one PC to the other and if network fail occurs
then this is called to as packet loss.
Throughput- while this is amount of data which is successfully upload from one PC to the other
into given time periods.
Securing LAN networking-
This would be included to as security of computers or network through various different
methods or technologies like that of antivirus, host intrusion prevention.
Metropolitan Area Network
MAN connects computers within a city, campus or a region bigger than what a LAN can cover.
MAN depends on network configuration. It can be used to connect areas that range from several
miles to tens of miles.
Wide Area Network
Wide Area Network is used to connect an entire nation or the whole world. WAN comprises of
several smaller network. WAN can be a collection of MANs and LANs. The internet is a very
good example of a public WAN.
under this type of method the viewer is having choice from various entertainment films or
other video which is by means of PC or TV systems that too on their own demand system.
Audio and video streaming-
this is the compressed form of audio or video that is sent over internet and then played on
immediate bases rather saving and then watching or listening them all.
Discuss Quality-of-Service in LAN and how they can be implemented
This would be diversified methods which is having predictable network behaviour and
then the performance like that of Voice-over-IP or video-on-demand.
Differentiated Service Code Point, 802.1q frame tagging, IP precedence
In the tag control information which is TCI there is 1st three bits which would be giving 8
priority level with defined priority of user. Like that of IEEE 802.1p is defining 3 priority of
user.
Bandwidth- this was traditionally defined to as bits per second ,like that of mega bite per second
(Mbps).
Latency- this could be defined to as time taken for one packet of data to reach another designated
point in another point.
Jitter- thus jitter would be the variation between two latency from packet flowing one system to
the other this will be resulting into network congestion and timing changes.
Packet loss- while one packet is travelling from one PC to the other and if network fail occurs
then this is called to as packet loss.
Throughput- while this is amount of data which is successfully upload from one PC to the other
into given time periods.
Securing LAN networking-
This would be included to as security of computers or network through various different
methods or technologies like that of antivirus, host intrusion prevention.
Metropolitan Area Network
MAN connects computers within a city, campus or a region bigger than what a LAN can cover.
MAN depends on network configuration. It can be used to connect areas that range from several
miles to tens of miles.
Wide Area Network
Wide Area Network is used to connect an entire nation or the whole world. WAN comprises of
several smaller network. WAN can be a collection of MANs and LANs. The internet is a very
good example of a public WAN.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Networking Technologies 10
Proposed Network for Beta Communication
Beta communication wants a network that can connect three buildings. These buildings have
employees and devices to handle the company’s day to day operations. According to present
requirements, the company doesn’t want a network that connects the entire region, country or
world. The best network type to satisfy this requirement would be “LAN”. With an efficient
LAN connection, Beta communication will be able to communicate, share and manage devices,
people and data that is spread across three buildings. The company can expand this LAN
connection to more buildings when required. Moreover, LAN allows easy access, high security
and fast data transfer rates. It is easy to separate responsibilities across each building with the
help of LAN.
Different network topologies
Network topology defines the way nodes or devices in a network are connected. It also defines
how networks communicate with one another. Each arrangement has its own advantages and
disadvantages.
The Bus topology has a central bus to which all network nodes are connected. All computers and
devices are connected to a single cable. This topology has two end points and nothing more. This
is an example of a linear topology. Data is transmitted in a single direction.
Benefits of Bus topology:
1) cost effective
2) fewer cables are required
3) easy to expand in a linear fashion
Drawbacks of Bus topology
Proposed Network for Beta Communication
Beta communication wants a network that can connect three buildings. These buildings have
employees and devices to handle the company’s day to day operations. According to present
requirements, the company doesn’t want a network that connects the entire region, country or
world. The best network type to satisfy this requirement would be “LAN”. With an efficient
LAN connection, Beta communication will be able to communicate, share and manage devices,
people and data that is spread across three buildings. The company can expand this LAN
connection to more buildings when required. Moreover, LAN allows easy access, high security
and fast data transfer rates. It is easy to separate responsibilities across each building with the
help of LAN.
Different network topologies
Network topology defines the way nodes or devices in a network are connected. It also defines
how networks communicate with one another. Each arrangement has its own advantages and
disadvantages.
The Bus topology has a central bus to which all network nodes are connected. All computers and
devices are connected to a single cable. This topology has two end points and nothing more. This
is an example of a linear topology. Data is transmitted in a single direction.
Benefits of Bus topology:
1) cost effective
2) fewer cables are required
3) easy to expand in a linear fashion
Drawbacks of Bus topology
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Networking Technologies 11
1) cable failures can bring down the entire network
2) heavy network traffic will decrease the network’s performance
Recommendation
It is not recommended for businesses to rely on bus topology. That is because the length of
cables is greatly limited and the risks of network failures are high.
Ring Topology is where all computers are connected to form a ring. The last device is connected
to the first device. Every device will have exactly two neighbors. This topology has plenty of
repeaters. If nodes want to communicate with one another, data would be transmitted to all the
nodes in between. Data is often transmitted in a sequential fashion, and two way communication
is possible in dual ring topologies.
Benefits of Ring Topology
1) Cheap to expand
2) Cheap to install
3) High traffic doesn’t affect the network’s performance
Drawbacks of Ring Topology
1) It is difficult to find errors
2) Adding or removing devices is difficult
Recommendation
1) cable failures can bring down the entire network
2) heavy network traffic will decrease the network’s performance
Recommendation
It is not recommended for businesses to rely on bus topology. That is because the length of
cables is greatly limited and the risks of network failures are high.
Ring Topology is where all computers are connected to form a ring. The last device is connected
to the first device. Every device will have exactly two neighbors. This topology has plenty of
repeaters. If nodes want to communicate with one another, data would be transmitted to all the
nodes in between. Data is often transmitted in a sequential fashion, and two way communication
is possible in dual ring topologies.
Benefits of Ring Topology
1) Cheap to expand
2) Cheap to install
3) High traffic doesn’t affect the network’s performance
Drawbacks of Ring Topology
1) It is difficult to find errors
2) Adding or removing devices is difficult
Recommendation

Networking Technologies 12
Beta Communication doesn’t need a ring topology. It will have issues tracking faults. Ring
topology is not recommended for big businesses. It endures high maintenance charges and
performance hassles. Failure can disturb the entire network.
Star topology is where computers are connected through cables to a single hub. This hub is a
central node. The hub is responsible for transferring data. All nodes have a dedicated connection
to the hub. This connection is established using coaxial cables, optical fiber cables and twisted
pair wires.
Benefits of Star topology
1) when there are few nodes, star topology is very fast
2) easy to troubleshoot, setup and modify
3) even with node failures, the network will continue to function
Drawbacks of Star topology
1) expensive
2) if the hub fails, the entire network would come down
3) performance depends on the hub
Recommendation
The star topology suffers high-dependency issues. All nodes depend on a single hub. This can be
very risky for the business organization.
Mesh topology involves point to point connection with all devices and nodes in the network.
There are two ways of transmitting data in a Mesh topology. Routing and Flooding can be used
Beta Communication doesn’t need a ring topology. It will have issues tracking faults. Ring
topology is not recommended for big businesses. It endures high maintenance charges and
performance hassles. Failure can disturb the entire network.
Star topology is where computers are connected through cables to a single hub. This hub is a
central node. The hub is responsible for transferring data. All nodes have a dedicated connection
to the hub. This connection is established using coaxial cables, optical fiber cables and twisted
pair wires.
Benefits of Star topology
1) when there are few nodes, star topology is very fast
2) easy to troubleshoot, setup and modify
3) even with node failures, the network will continue to function
Drawbacks of Star topology
1) expensive
2) if the hub fails, the entire network would come down
3) performance depends on the hub
Recommendation
The star topology suffers high-dependency issues. All nodes depend on a single hub. This can be
very risky for the business organization.
Mesh topology involves point to point connection with all devices and nodes in the network.
There are two ways of transmitting data in a Mesh topology. Routing and Flooding can be used
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 41
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





