Page 2 of 3 FirstFirst 123 LastLast
Results 11 to 20 of 24

Thread: Network topology???

  1. #11
    Junior Member
    Join Date
    Aug 2002
    Posts
    11
    a very imortant thing about ring to remember is that the performance of the overall network degrades gracefully instead of just crashing when overloaded (it slows down a lot but not stop) ... this is very imortant in high priority networks (think hospitals, millitary)
    stickin\' feathers up your butt does not make you a chicken T.D.

  2. #12
    Senior Member SodaMoca5's Avatar
    Join Date
    Mar 2002
    Posts
    236
    The Star topology has, for the most part, replaced the ring topology. However let's look at each in a little depth and see the evolution of where they came from.

    First, let's not confuse our physical layer protocol with our network protocol. So I can use TCP/IP and at the physical layer it can be transported on Ethernet which is a collision topology, ATM, FDDI, or many other physical layer protocols.

    At one time (late 80's/early 90's) the star topology was a weak topology because the hierarchy was not advanced enough to support larger networks. Routers sucked and switching was not available so if you had 20 computers on a network anytime one of them sent a message out the connection from all of them were blocked for that short period of time. The more computers the greater the chance of collision and the need for retransmission was. The accepted max on a network was around 120 while the suggested was no more than 24. The main method for segmenting a network was the bridge (see also brouter for an interesting historical term) which for star systems was fairly expensive. Routers were available but most didn't work well or were very unstable.

    At this same time the Token Ring topology came out. Because it did not use a CSMAC/CD (Carrier Sensing Media Access Control/Collision Detection) system like Ethernet does it could use a higher percentage of the bandwidth. For comparison Ethernet can use up to about 60% of its rated bandwidth before collisions start reducing the effectiveness of the network while Token Ring can effectively use 95% of its rated bandwidth. This is sustained usage not burst or spike.

    The way Token Ring operates is that each system when it enters the network sends out a token announcing it presence and it locates its down stream neighbor and its upstream neighbor. Then it becomes part of the ring. Assume the ring has 3 computers on it A,B,C. The ring is established so A sends a message and at the end of the message passes the token along. B gets the message, uses it if needed, retransmits it, finds the token and adds its own message. C receives A's, reads, retransmits, receives B's, reads, retransmits, sees token and adds its own message. A receives its own removes it from the ring, receives B's, reads, retransmits, receives C's, reads, retransmits, sees token and can add its own packet. This continues. No collisions ever happen because the retransmit is always to the next computer up the chain and everything runs like a train.

    If two networks have to connect then one of the devices must operate as a Bridge or Gateway (bridge if between like systems, gateway if between dis-similar systems). With this scenario if Ring A wants to communicate with Ring B it sends the message around which is checked and retransmitted on Ring A until it reaches the bridge. The bridge then retransmits it on A and B however on B it makes itself the sending agent. On ring A the packet is removed when it returns to its owner on Ring B it is removed when it returns to the bridge. In this way every device that could possibly want the packet gets it on both rings.

    In this manner the original 4 Mbps Token ring could operate as fast or faster than a 10 Mbps Ethernet. When the 16 Mbps Token ring came out it blew the Ethernet out of the water for speed and capability. The drawbacks, however, were that any time a machine was added or removed the ring had to be broken. Ring restoration is fairly quick but this meant that if one system went down the ring went down until it was removed or replaced. However, Token Ring proved to be extremely reliable once set up properly. I have never set one up but what I was told by a few experts is that it was difficult to get them working exactly right but once they were they seemed to work forever or until messed with.

    In an attempt to fix some of the inherent problems with the ring the dual ring topology was implemented. FDDI is the best example of the dual ring and while I have worked with FDDI and it seems viable I loathe it with a passion. The theory here is that there is a primary and secondary ring. Data flows on the primary only while the secondary merely maintains itself with beacon packets going in the opposite direction of the Primary ring. If a station goes down then the neighbors to that station loop the primary to the secondary and a single ring is created to re-establish a path. This way hardware can be removed or added and the ring will self heal itself and re-establish full operation automatically. In practice where I worked FDDI proved to be unstable at times and very difficult to troubleshoot. Also its speed (100 Mbps) and range (total ring distance of 100 Km) were overwhelmed by ATM and Gigabit Ethernet (Thank God).

    Now with the advent of cheap hubs, switches, routers, and the ASIC (Application Specific Integrated Circuits) the Star topology is much better than the ring. Devices can be added and removed without affecting the topology. Collision domains can be easily created to limit network interference. Troubleshooting becomes much simpler because you can trace from router to switch to port and finally to device. The Star topology can also be built with easily created redundant pathways that lead to a more fault tolerant network. This has only been really available though in the last 5-8 years. Before that is when the real battle between Star vs Ring occurred.
    SodaMoca5
    \"We are pressing through the sphincter of assholiness\"

  3. #13
    Junior Member
    Join Date
    Oct 2002
    Posts
    3
    Don't forget that there is a difference between a ring topology, and a token ring network. Although token ring networks are the most common implementation of the ring topology it is not necessarily the only one.

    If you remove the 'token' from the ring topology, you get the benefit of always having at least two paths to every machine. Therefore, if one cable was cut all machines on the network could still communicate.

  4. #14
    Junior Member
    Join Date
    Oct 2002
    Posts
    4
    Ring topology is only around because companies can't afford or don't bother to replace it. That is why you see it intergrated into systems today.

  5. #15
    Senior Member cwk9's Avatar
    Join Date
    Feb 2002
    Posts
    1,207
    Just a little tutorial I wrote on topologies
    http://www.antionline.com/showthread...light=topology

    The main problem was that it was proprietary (IBM I think) so it cost more. Saw some old token ring network cables they were thick with large connectors you could see why people would prefer to wire cat5 and save on cable.
    Its not software piracy. I’m just making multiple off site backups.

  6. #16
    Senior since the 3 dot era
    Join Date
    Nov 2001
    Posts
    1,542

    balun

    cwk9, the thick cable had one advantage -> shielding

    There are companies that still use Token Ring cables but now with Ethernet by placing so called "baluns" on the connectors. This means you do not need to replace all cables (for instance in walls, cielings, ... mostly in older buildings) but only place balun connectors to connect to the nowadays regular cat5e UTP cabling. So you are using your tokenring cables to run ethernet. (There is however no "convertor" from token ring to ethernet networks. To combine both network topologies You will need a pc acting like a router or bridge or a hardware bridge to accomplish such a task.)



    Here's an interesting read about high speed token-ring solutions (100Mbit and gigabit)

  7. #17
    Junior Member
    Join Date
    Nov 2002
    Posts
    4
    This may be wrong, but I have been told that in a Ring Topology, all users get an equal share of the bandwidth. In a Star Topology, one user can bog down the network but taking all the bandwidth but I don't believe this is possible in a Ring Topology.

  8. #18
    Senior Member cwk9's Avatar
    Join Date
    Feb 2002
    Posts
    1,207
    AcidBurn1213 every one gets an equal share of bandwidth unless it’s set other wise. Token Ring networks use a sophisticated priority system and permits certain user-designated priorities. So you would assign things like servers and your boss’s workstation a higher priority.
    Its not software piracy. I’m just making multiple off site backups.

  9. #19
    Junior Member
    Join Date
    Nov 2002
    Posts
    4
    Hmmm, maybe I was thinking of a Token Ring network then. Either way I still had stuff screwed up.

  10. #20
    well token may work for some but for me star works best all my systems have a direct connection to the router/ hub and i have not had as many peoblems with it. till something better comes out i will stick with it.
    Ametuers get jail time Pros get jobs.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •