Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
Network Topologies: Ring This lesson focuses on the ring topology. In ring topology, all of the nodes are connected to form a loop between them and data is transferred using a token. A token is a data indicating endpoint. Mesh topology is advantageous because it has fewer collisions and allows for equal access. Disadvantages is that is passes data on to every computer, if one workstation gets it; they all get it.