Article

An Evaluation of Network Topologies for Enhance Networking

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Networking is referred as connecting computers electronically for the purpose of sharing information. Resources such as files, applications, printers and software are common information shared in a networking. The advantage of networking can be seen clearly in terms of security, efficiency, manageability and cost effectiveness as it allows collaboration between users in a wide range. Basically, network consists of hardware component such as computer, hubs, switches, routers and other devices which form the network infrastructure. These are the devices that play an important role in data transfer from one place to another using different technology such as radio waves and wires. There are many types of network available in the networking industries and the most common network are Local Area Network (LAN) and Wide Area Network (WAN).LAN network is made up of two or more computers connected together in a short distance usually at home, office buildings or school. WAN is a network that covers wider area than LAN and usually covers cities, countries and the whole world. Several major LAN can be connect together to form a WAN. As several devices are connected to network, it is important to ensure data collision does not happened when this devices attempt to use data channel simultaneously. A set of rules called Carrier Sense Multiple Access / Collision detection are used to detect and prevent collision in networks.
Article
This paper describes a computer package for the investigation of the capacity requirements of computer networks, and how it has been applied to GULFNET, the research network of the Arab Gulf States. The package is based on a mathematical model that considers various factors including: network topology, traffic streams, routing, traffic flow through links, delay and capacity. The model is distinguished for its generality and performance criterion. It permits each traffic stream between any pair of nodes to be independent of other streams; and it allows constraints to be specified on the maximum link delay, maximum path delay, and average overall delay. The application of the package to GULFNET demonstrates its practical use under different circumstances, and provides useful results.
Article
Thesis (M.Sc. (Computer Science))--North-West University, Potchefstroom Campus, 2007.
Network topologies. Application Note. Sterlite Tech. (Application Note). Retrieved from www.sterlitetechnologies
  • P John
  • P Timo
John, P. & Timo, P. (2014). Network topologies. Application Note. Sterlite Tech. (Application Note). Retrieved from www.sterlitetechnologies.com on March 08, 2022.
  • M G Naugle
Naugle, M. G. (1994). Network Protocol Handbook. McGraw-Hill series on computer communications. Handbook. McGraw-Hill 1994 Vol (Illustrated), pp. 521. Published online: 7 December 2007.
Analytical Study of different network topologies
  • B Nivedita
  • S Sapna
Nivedita, B. & Sapna S. (2015). Analytical Study of different network topologies. International Research Journal of Engineering and Technology (IRJET). Vol (2), p. 89.
Applied Combinatorics
  • F S Roberts
Roberts, F. S. (1984). Applied Combinatorics, Prentice Hall, Englewood Cliffs, NJ, pp. 443446, 1984.