1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fiasKO [112]
2 years ago
5

What are the different types of topology?​ in details

Computers and Technology
2 answers:
cupoosta [38]2 years ago
8 0

\huge\mathcal{♨ANSWER♥}

Geometric representation of how the computers are connected to each other is known as topology. There are five types of topology.

They are,

  • Bus topology
  • Ring topology
  • Star topology
  • Mesh topology
  • Tree topology

<h3>♻Bus topology </h3>

Bus topology, also known as line topology, is a type of network topology in which all devices in the network are connected by one central RJ-45 network cable or coaxial cable. The single cable, where all data is transmitted between devices, is referred to as the bus, backbone, or trunk.

<h3>♻Ring topology</h3>

Ring topology is a type of network topology in which each device is connected to two other devices on either side via an RJ-45 cable or coaxial cable. This forms a circular ring of connected devices which gives it its name. Data is commonly transferred in one direction along the ring, known as a unidirectional ring.

<h3>♻Star topology </h3>

Star topology is an implementation of a spoke–hub distribution paradigm in computer networks. In a star network, every host is connected to a central hub. In its simplest form, one central hub acts as a conduit to transmit messages. The star topology is one of the most common computer network topologies.

<h3>♻Mesh topology </h3>

A mesh topology is a network setup where each computer and network device is interconnected with one another. This topology setup allows for most transmissions to be distributed even if one of the connections goes down. It is a topology commonly used for wireless networks.

<h3>♻Tree topology </h3>

A tree topology is a special type of structure where many connected elements are arranged like the branches of a tree. For example, tree topologies are frequently used to organize the computers in a corporate network, or the information in a database.

<u>☆</u><u>.</u><u>.</u><u>.</u><u>hope this helps</u><u>.</u><u>.</u><u>.</u><u>☆</u>

_♡_<em>mashi</em>_♡_

wlad13 [49]2 years ago
3 0

Answer:

<h2> <u>NETWORK</u> <u>TOPOLOGY</u> .</h2>

This tefers to how nodes are connected to the network.

Types of topology.

  • Physical topology.
  • Logical topology.

In physical topology,nodes are connected physically using wires(cables).

Types of physical topology include:

  • Bus topology
  • Tree topology
  • Hybrid topology
  • Star topology
  • Ring topology.

Hope it helps you,any question so far...comment !!!

You might be interested in
What is Server Message Block (SMB) used for in Windows and can a hacker still damage a network using SMB?
Aleksandr [31]

Answer:

The absolute most decimating ransomware and Trojan malware variations rely upon vulnerabilities in the Windows Server Message Block (SMB) to proliferate through an association's system. Windows SMB is a convention utilized by PCs for record and printer sharing, just as for access to remote administrations.  

A fix was discharged by Microsoft for SMB vulnerabilities in March 2017, yet numerous associations and home clients have still not applied it. So now, the unpatched frameworks permit dangers that exploit these vulnerabilities inside, helping dynamic malware crusades spread like Californian rapidly spreading fire.  

SMB vulnerabilities have been so effective for danger entertainers that they've been utilized in the absolute most unmistakable ransomware episodes and refined Trojan assaults of the most recent two years. Truth be told, our item telemetry has recorded 5,315 discoveries of Emotet and 6,222 of TrickBot in business systems—two Trojan variations that are utilizing the SMB vulnerabilities—over the most recent 30 days alone.

7 0
3 years ago
Read 2 more answers
Java IntelliJ
andrew11 [14]

Answer:

Your solution is ready.

Explanation:

Visit: gotit-pro.com/design-a-gui-interface-to-accept-user-input-and-add-the-data-to-a-cell-phone

And get the complete working code for this assignment.

Feel free to reach out to me for fastest, top-notch and impeccable homework and exams help including Pearson Labs etc.

Thanks and Best Regards: Your Friendly Study Co-Pilot

3 0
3 years ago
Many contemporary languages allow two kinds of comments: one in which delimiters are used on both ends (multiple-line comments),
m_a_m_a [10]

Answer and Explanation:

Multiple-line comments :

Advantage :In the event that we need to remark out of zone of the given program , we can utilize it.

Disadvantage : In numerous line results are in reduced unwavering quality. It stretches out the remark as far as possible of the following comment.For least difficult approach to unintentionally leave off the last delimiter, which successfully expelling code from the program.

Single Line Comments :

Advantage :In the event that you need to close all the delimiter before close the program we utilize this kind of remarks.

Disadvantage : It put more burden on your program .It repeated on every line of a block of comments

3 0
3 years ago
MCQ: A computer network is interconnection of two or more:
timama [110]

Answer:

computers

Explanation:

it is because other remaining are not able to access network

4 0
2 years ago
Which kind of photography takes attractive photos of products to make them stand out?
CaHeK987 [17]

Answer:

See there are multiple ways to get a perfect shot of products to stand out but the most affective according to me are explained below :-

  • Macro shooting - These are close shots u can say really close just to show the product more attractive and u can see these types of shots in every advertisement.
  • Background shooting/shots - Opposite of macro shots.
  • 3d shots - These are 360° shots.

Tip :- Use wide aperture like F2 and right aperture for right shots.

Hope it helps!

3 0
3 years ago
Other questions:
  • Identifying the problem is crucial when trying to solve a problem. There are several techniques that you can use to aide you in
    5·1 answer
  • A ____ is a program that is installed without the permission or knowledge of the computer user, that is designed to alter the wa
    11·1 answer
  • Software engineering design teams use ________, which are grounded in mathematical concepts of sets and relations, for their sof
    13·1 answer
  • Five computers are connected to a switch in a star topology. what type of network is this?
    12·1 answer
  • Write an expression that executes the loop body as long as the user enters a non-negative number. Note: If the submitted code ha
    14·1 answer
  • The main disadvantage of using this device is its negative impact on network performance,resulting from the fact that any incomi
    10·1 answer
  • Which of the following accurately describes one way that individual goods
    11·1 answer
  • a rule that states each foreign key value must match a primary key value in the other relation is called the
    5·1 answer
  • Which of these is an example of rebranding ?
    6·2 answers
  • A non-profit organization decides to use an accounting software solution designed for non-profits. The solution is hosted on a c
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!