FUNDAMENTALS OF INFORMATION SYSTEMS
FUNDAMENTALS OF INFORMATION SYSTEMS
9th Edition
ISBN: 9781337897747
Author: STAIR
Publisher: CENGAGE L
Question
Book Icon
Chapter 4, Problem 1LO
Program Plan Intro

Three network topologies, four different network types, along withthe uses and limitations of each.

Expert Solution & Answer
Check Mark

Explanation of Solution

Network topologies defines the shape, structure and arrangement in which components of a network can be linked. Though, among networks transmission rate, distance between nodes, signal types and physical media uses for connection may differ, but they may have the same topology.

The three main popular network topologies used are star, bus and mesh topologies.

Star topology: In this topology, all nodes in a network are connected to a central node which is known as hub node. Start topology is very easy to implement and is used when lesser number of devices are required to be connected. The main drawback of star topology is that in case, there is failure of central node, the entire network will go down. The figure below shows devices connected in star topology:

FUNDAMENTALS OF INFORMATION SYSTEMS, Chapter 4, Problem 1LO , additional homework tip  1

Bus topology: In this topology, every node on the network is connected through a common commnication channel known as Bus. For communication purposes, whenever any device needs to communicate with any other device, it sends braodcast messages through a communication link which goes to all devices but can only be accepted and processed by the intended receiving device. But topology is the easiest way to establishing a network and also,the cost of implementation is less. The main issue with bus topology is that for a large network, there is more amount of time needed for communication between devices at extreme ends than devices which are in close proximity. Also, in case of failure of bus, the whole network has to be restructured which is a very time consuming process. The following figure shows bus topology:

FUNDAMENTALS OF INFORMATION SYSTEMS, Chapter 4, Problem 1LO , additional homework tip  2

Mesh topology: In mesh topology, nodes can be connected on network using multiple access points. Each device on the network is directly linked with another device. In mesh topology, a connection is established between the sending device and receiving device by routing through node to node and make a continous connection which does not have any blocked nodes. Mesh topology is the most reliable type of computer network because in case of failure of any node, the network remains in active state. Also, adding more devices to the network is also an easy process. The only drawback of mesh topology is that it cannot handle large number of devices in the network and fault detetction also becomes a hectic task.The following figure shows mesh topology:

FUNDAMENTALS OF INFORMATION SYSTEMS, Chapter 4, Problem 1LO , additional homework tip  3

Based on physical distances between the connected nodes of a network, the networkscan be classified as personal area network, local area network, metropolitan area network and wide area network.

Personal area network (PAN): PAN is a wireless network which is setup near a person. A person can connect laptops, digital cameras, mobile phones, printers etc by using personal area. all together. PAN is also used in IoT connections for allowing sensors to receive data from your body and transmit it to your smartphone which can be used for health tracking, glucose monitoring, and pedometers.

Local area network (LAN): LAN network connects computing devices within an office, home or building. Typically, a LAN network, has hundreds of computing devices connected to the network. LAN network is used to create a private and secure network.

Metropolitan area network (MAN): MAN is used to connect multiple LAN networks spread across various small geographical locations together. Two or more LAN networks can be connected into a WAN network. MAN, networks can be used to connect multiple offices of an organization locatedin different locations.

Wide area network (WAN): WAN is used to connect large geographical regions. They are mainly used to provide communication over national borders. A WAN network can be either be privately owned or can be rented. WAN comes to picture when you try to make a phone call to somebody who is in any other international location. For establishing WAN, national and international laws need to be taken care while handling and monitoring data flow through these networks.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
DESCRIBE THREE REQUIREMENTS FOR A STRONG AND EFFECTIVE NETWORK.
Please describe the commercial benefits and consequences of alternate network topologies. Important factors include specificity and building a relationship to previously established technologies. What if you have worked on or seen comparable events or circumstances in the past, making you better suitable for the position?
What are the three conditions for an effective and successful network? Please include a description of one.

Chapter 4 Solutions

FUNDAMENTALS OF INFORMATION SYSTEMS

Ch. 4 - Prob. 11LOCh. 4 - Prob. 12LOCh. 4 - Prob. 13LOCh. 4 - Prob. 1.1RQCh. 4 - Prob. 1.2RQCh. 4 - Prob. 1.1CTQCh. 4 - Prob. 1.2CTQCh. 4 - Prob. 2.1RQCh. 4 - Prob. 2.2RQCh. 4 - Prob. 2.1CTQCh. 4 - Prob. 2.2CTQCh. 4 - Prob. 3.1RQCh. 4 - Prob. 3.2RQCh. 4 - Prob. 3.1CTQCh. 4 - Prob. 3.2CTQCh. 4 - Prob. 4.1RQCh. 4 - Prob. 4.2RQCh. 4 - Prob. 4.1CTQCh. 4 - Prob. 4.2CTQCh. 4 - Prob. 1SATCh. 4 - Prob. 2SATCh. 4 - Prob. 3SATCh. 4 - Prob. 4SATCh. 4 - Prob. 5SATCh. 4 - Prob. 6SATCh. 4 - Prob. 7SATCh. 4 - Prob. 8SATCh. 4 - Prob. 9SATCh. 4 - Prob. 10SATCh. 4 - Prob. 11SATCh. 4 - Prob. 12SATCh. 4 - Prob. 13SATCh. 4 - Prob. 14SATCh. 4 - Prob. 15SATCh. 4 - Prob. 1RQCh. 4 - Prob. 2RQCh. 4 - Prob. 3RQCh. 4 - Prob. 4RQCh. 4 - Prob. 5RQCh. 4 - Prob. 6RQCh. 4 - Prob. 7RQCh. 4 - Prob. 8RQCh. 4 - Prob. 9RQCh. 4 - Prob. 10RQCh. 4 - Prob. 11RQCh. 4 - Prob. 12RQCh. 4 - Prob. 13RQCh. 4 - Prob. 14RQCh. 4 - Prob. 15RQCh. 4 - Prob. 16RQCh. 4 - Prob. 17RQCh. 4 - Prob. 18RQCh. 4 - Prob. 19RQCh. 4 - Prob. 1DQCh. 4 - Prob. 2DQCh. 4 - Prob. 3DQCh. 4 - Prob. 4DQCh. 4 - Prob. 5DQCh. 4 - Prob. 6DQCh. 4 - Prob. 7DQCh. 4 - Prob. 8DQCh. 4 - Prob. 9DQCh. 4 - Prob. 10DQCh. 4 - Prob. 11DQCh. 4 - Prob. 12DQCh. 4 - Prob. 13DQCh. 4 - Prob. 14DQCh. 4 - Prob. 15DQCh. 4 - Prob. 16DQCh. 4 - Prob. 17DQCh. 4 - Prob. 18DQCh. 4 - Prob. 19DQCh. 4 - Prob. 1PSECh. 4 - Prob. 2PSECh. 4 - Prob. 3PSECh. 4 - Prob. 1WECh. 4 - Prob. 2WECh. 4 - Prob. 3WECh. 4 - Prob. 1CECh. 4 - Prob. 2CECh. 4 - Prob. 3CECh. 4 - Prob. 1.1CSCh. 4 - Prob. 1.2CSCh. 4 - Prob. 1.3CSCh. 4 - Prob. 2.1CSCh. 4 - Prob. 2.2CSCh. 4 - Prob. 2.3CS
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning