Skip to main content

RING TOPOLOGY

RING TOPOLOGY :

"Ring topology looks like the bus topology with connected ends.
But In functionality it is different."

WORKING OF Ring Topology

 Each computer is connected to the next computer in the form of ring.
Each retransmit what it receives from the previous computer.
The message flow in one direction.
Ring topology connects computers on a single circle of cable.
There is no terminated ends
Signals travel around the loop in one direction and pass through each computer.
Unlike bus topology, each computer acts like a repeater to boost the signal and send it to the next computer.
It is called endless topology.
In ring topology, data flows in ring and in clock-wise direction.
Ring topology is based on “Token Ring Mechanism”.


Token Passing
  • A token is passed around the network.
  • The computer that has token can transmit data.
  • Token is passed from computer to computer until it reaches to its destination.
  • The destination device returns an acknowledgement to the sender.
  • The destination device returns an acknowledgement to the sender.
  • The token is then given to another device, giving it ability to transmit.
  • The token is then given to another device, giving it ability to transmit
  • The sending computer modified the token, puts address with the data and sends it around the ring.
  • Data passed by each computer until it finds the computer with an address that matches.
  • Token is used as a carrier.
  • It is called token grab.
  • ADVANTAGES of Ring Topology
  • when the load on the network increases, its performance is better than that of Bus topology.
  • There is no need for network server to control the connectivity between workstations.
  • Additional components do not affect the performance of network.
  • Each computer has equal access to resource.
  • Token ring technology reduces the need of server or central hub to manage the workstations. 


DISADVANTAGES of Ring Topology
If one node is disrupted then the whole network goes down.
Only one machine can transmit on the network at a time.
The failure of one machine will cause the entire network to fail.

Comments

Popular posts from this blog

Active and Passive FTP

Active and Passive FTP The FTP server may support Active or Passive connections, or both.  In an Active FTP connection, the client opens a port and listens and the server actively connects to it.  In a Passive FTP connection, the server opens a port and listens (passively) and the client connects to it.  You must grant Auto FTP Manager Access to the Internet and to choose the right type of FTP Connection Mode. Most FTP client programs select passive connection mode by default because server administrators prefer it as a safety measure.  Firewalls generally block connections that are "initiated" from the outside.  Using passive mode, the FTP client is "reaching out" to the server to make the connection.  The firewall will allow these outgoing connections, meaning that no special adjustments to firewall settings are required. If you are connecting to the FTP server using Active mode of connection you must set your firewa...