Computer Network Topology refers to the distribution and connection status of devices between networks composed of computers. Drawing them on a diagram becomes a topology diagram. Generally, the location of the equipment should be marked on the diagram. The location, the name type of the device, and the type of connection medium between devices. It is divided into two types: physical topology and logical topology.
Computer network topology
The topology of a computer network refers to the computers or devices on the Internet The physical pattern of nodes and lines formed with the transmission medium. There are two types of network nodes: one is the transfer node that converts and exchanges information, including node switches, hubs, and terminal controllers; the other is the access node, including computer hosts and terminals. Lines represent various transmission media, both tangible and intangible.
Composition
Every network structure is composed of nodes, links and pathways.
1. Node: also called network unit, it is various data processing equipment, data communication control equipment and data terminal equipment in the network system. Common nodes include servers, workstations, lines, switches and other equipment.
2. Link: The connection between two nodes can be divided into two types: physical link and logical link. The former refers to the actual communication line, and the latter refers to the logical link. Network access.
3. Path: refers to a series of nodes and links from the node that sends information to the node that receives information, that is, a series of nodes to nodes established through the communication network. chain.
Recommended courses: PHP Tutorial.
Selectivity
The choice of topology is often closely related to the selection of transmission media and the determination of media access control methods. When choosing a network topology, the main factors that should be considered are the following:
(1) Reliability. Improve reliability as much as possible to ensure that all data streams can be received accurately; the maintainability of the system should also be considered to make fault detection and fault isolation more convenient.
(2) Fees. Channel charges and installation charges suitable for specific applications need to be considered when building a network.
(3) Flexibility. It needs to be considered that when the system is expanded or modified in the future, it can easily reconfigure the network topology and can easily handle the deletion of original sites and the addition of new sites.
(4) Response time and throughput. To provide users with the shortest possible response time and maximum throughput.
Common types
The topologies of computer networks mainly include: bus topology, star topology, ring topology, tree topology, mesh topology and hybrid Topology.
Network determination
Whether it is a local area network or a wide area network, the choice of its topology needs to consider many factors: the network must be easy to install and expand; Reliability is also an important factor to consider. It must be easy to diagnose and isolate faults so that the main body of the network can still operate normally when a local failure occurs. The choice of network topology will also affect the selection of transmission media and the determination of media access control methods. These Factors will also affect the running speed of each site on the Internet and the complexity of network software and hardware interfaces.
The above is the detailed content of What is the topology of computer network. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

SublimeText3 Linux new version
SublimeText3 Linux latest version
