Types of Network Topologies

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here

Types of Network Topologies:

The mapping of a LAN design is called Topology. There are four categories: Star topology, Bus topology, Ring topology and Mesh topology. Hybrid combinations of these topologies also exist.

Star topology – all computers and devices are connected to a main hub or switch. The hub or switch amasses and disburses the flow of data within the network. Star topology is the most common type of network and follows the Ethernet standard.

Bus topology – in this arrangement computers and devices are connected to a single linear cable called a trunk. The trunk is also referred to as the backbone or a segment. Each end of the trunk must be discharged to prevent the signal from rebounding back up the cable.

Ring topology – computers and devices are connected to a closed loop cable. Here there are no terminating ends so if one system crashes the entire network goes down. Each computer functions as a repeater and charges the signal before sending it to the next station.

In Ring topology data is sent through the network by way of a token. If the token isn’t carrying any data, a computer waiting to send data seizes it, attaches the data and the electronic address to the token and sends it on. Once the token is received by the destination computer it strips the data and the token is sent on. This is why it’s named a token ring network.

Mesh topology – 

Learn more about this topic in our FREE CISSP course >

Check out our other FREE courses and study resources on this topic:

View Topics

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?