Fundamentals of Information Systems
Fundamentals of Information Systems
9th Edition
ISBN: 9781337097536
Author: Ralph Stair, George Reynolds
Publisher: Cengage Learning
Question
Book Icon
Chapter 4, Problem 1LO
Program Plan Intro

Three network topologies, four different network types, along withthe uses and limitations of each.

Expert Solution & Answer
Check Mark

Explanation of Solution

Network topologies defines the shape, structure and arrangement in which components of a network can be linked. Though, among networks transmission rate, distance between nodes, signal types and physical media uses for connection may differ, but they may have the same topology.

The three main popular network topologies used are star, bus and mesh topologies.

Star topology: In this topology, all nodes in a network are connected to a central node which is known as hub node. Start topology is very easy to implement and is used when lesser number of devices are required to be connected. The main drawback of star topology is that in case, there is failure of central node, the entire network will go down. The figure below shows devices connected in star topology:

Fundamentals of Information Systems, Chapter 4, Problem 1LO , additional homework tip  1

Bus topology: In this topology, every node on the network is connected through a common commnication channel known as Bus. For communication purposes, whenever any device needs to communicate with any other device, it sends braodcast messages through a communication link which goes to all devices but can only be accepted and processed by the intended receiving device. But topology is the easiest way to establishing a network and also,the cost of implementation is less. The main issue with bus topology is that for a large network, there is more amount of time needed for communication between devices at extreme ends than devices which are in close proximity. Also, in case of failure of bus, the whole network has to be restructured which is a very time consuming process. The following figure shows bus topology:

Fundamentals of Information Systems, Chapter 4, Problem 1LO , additional homework tip  2

Mesh topology: In mesh topology, nodes can be connected on network using multiple access points. Each device on the network is directly linked with another device. In mesh topology, a connection is established between the sending device and receiving device by routing through node to node and make a continous connection which does not have any blocked nodes. Mesh topology is the most reliable type of computer network because in case of failure of any node, the network remains in active state. Also, adding more devices to the network is also an easy process. The only drawback of mesh topology is that it cannot handle large number of devices in the network and fault detetction also becomes a hectic task.The following figure shows mesh topology:

Fundamentals of Information Systems, Chapter 4, Problem 1LO , additional homework tip  3

Based on physical distances between the connected nodes of a network, the networkscan be classified as personal area network, local area network, metropolitan area network and wide area network.

Personal area network (PAN): PAN is a wireless network which is setup near a person. A person can connect laptops, digital cameras, mobile phones, printers etc by using personal area. all together. PAN is also used in IoT connections for allowing sensors to receive data from your body and transmit it to your smartphone which can be used for health tracking, glucose monitoring, and pedometers.

Local area network (LAN): LAN network connects computing devices within an office, home or building. Typically, a LAN network, has hundreds of computing devices connected to the network. LAN network is used to create a private and secure network.

Metropolitan area network (MAN): MAN is used to connect multiple LAN networks spread across various small geographical locations together. Two or more LAN networks can be connected into a WAN network. MAN, networks can be used to connect multiple offices of an organization locatedin different locations.

Wide area network (WAN): WAN is used to connect large geographical regions. They are mainly used to provide communication over national borders. A WAN network can be either be privately owned or can be rented. WAN comes to picture when you try to make a phone call to somebody who is in any other international location. For establishing WAN, national and international laws need to be taken care while handling and monitoring data flow through these networks.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
A cylinder of diameter 10 cm rotates concentrically inside another hollow cylinder of inner diameter 10.1 cm. Both cylinders are 20 cm long and stand with their axis vertical. The annular space is filled with oil. If a torque of 100 kg cm is required to rotate the inner cylinder at 100 rpm, determine the viscosity of oil. Ans. μ= 29.82poise
Make the following game user friendly with GUI, with some simple graphics The following code works as this: The objective of the player is to escape from this labyrinth. The player starts at the bottom left corner of the labyrinth. He has to get to the top right corner of the labyrinth as fast he can, avoiding a meeting with the evil dragon. The player can move only in four directions: left, right, up or down. There are several escape paths in all labyrinths. The player’s character should be able to moved with the well known WASD keyboard buttons. If the dragon gets to a neighboring field of the player, then the player dies. Because it is dark in the labyrinth, the player can see only the neighboring fields at a distance of 3 units.  Cell Class: public class Cell { private boolean isWall; public Cell(boolean isWall) { this.isWall = isWall; } public boolean isWall() { return isWall; } public void setWall(boolean isWall) { this.isWall = isWall; } @Override public String toString() {…
Please original work What are four of the goals of information lifecycle management think they are most important to data warehousing, Why do you feel this way, how dashboards can be used in the process, and provide a real life example for each. Please cite in text references and add weblinks

Chapter 4 Solutions

Fundamentals of Information Systems

Ch. 4 - Prob. 11LOCh. 4 - Prob. 12LOCh. 4 - Prob. 13LOCh. 4 - Prob. 1.1RQCh. 4 - Prob. 1.2RQCh. 4 - Prob. 1.1CTQCh. 4 - Prob. 1.2CTQCh. 4 - Prob. 2.1RQCh. 4 - Prob. 2.2RQCh. 4 - Prob. 2.1CTQCh. 4 - Prob. 2.2CTQCh. 4 - Prob. 3.1RQCh. 4 - Prob. 3.2RQCh. 4 - Prob. 3.1CTQCh. 4 - Prob. 3.2CTQCh. 4 - Prob. 4.1RQCh. 4 - Prob. 4.2RQCh. 4 - Prob. 4.1CTQCh. 4 - Prob. 4.2CTQCh. 4 - Prob. 1SATCh. 4 - Prob. 2SATCh. 4 - Prob. 3SATCh. 4 - Prob. 4SATCh. 4 - Prob. 5SATCh. 4 - Prob. 6SATCh. 4 - Prob. 7SATCh. 4 - Prob. 8SATCh. 4 - Prob. 9SATCh. 4 - Prob. 10SATCh. 4 - Prob. 11SATCh. 4 - Prob. 12SATCh. 4 - Prob. 13SATCh. 4 - Prob. 14SATCh. 4 - Prob. 15SATCh. 4 - Prob. 1RQCh. 4 - Prob. 2RQCh. 4 - Prob. 3RQCh. 4 - Prob. 4RQCh. 4 - Prob. 5RQCh. 4 - Prob. 6RQCh. 4 - Prob. 7RQCh. 4 - Prob. 8RQCh. 4 - Prob. 9RQCh. 4 - Prob. 10RQCh. 4 - Prob. 11RQCh. 4 - Prob. 12RQCh. 4 - Prob. 13RQCh. 4 - Prob. 14RQCh. 4 - Prob. 15RQCh. 4 - Prob. 16RQCh. 4 - Prob. 17RQCh. 4 - Prob. 18RQCh. 4 - Prob. 19RQCh. 4 - Prob. 1DQCh. 4 - Prob. 2DQCh. 4 - Prob. 3DQCh. 4 - Prob. 4DQCh. 4 - Prob. 5DQCh. 4 - Prob. 6DQCh. 4 - Prob. 7DQCh. 4 - Prob. 8DQCh. 4 - Prob. 9DQCh. 4 - Prob. 10DQCh. 4 - Prob. 11DQCh. 4 - Prob. 12DQCh. 4 - Prob. 13DQCh. 4 - Prob. 14DQCh. 4 - Prob. 15DQCh. 4 - Prob. 16DQCh. 4 - Prob. 17DQCh. 4 - Prob. 18DQCh. 4 - Prob. 19DQCh. 4 - Prob. 1PSECh. 4 - Prob. 2PSECh. 4 - Prob. 3PSECh. 4 - Prob. 1WECh. 4 - Prob. 2WECh. 4 - Prob. 3WECh. 4 - Prob. 1CECh. 4 - Prob. 2CECh. 4 - Prob. 3CECh. 4 - Prob. 1.1CSCh. 4 - Prob. 1.2CSCh. 4 - Prob. 1.3CSCh. 4 - Prob. 2.1CSCh. 4 - Prob. 2.2CSCh. 4 - Prob. 2.3CS
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning