Mesh Topology Report

Embed Size (px)

Citation preview

  • 7/28/2019 Mesh Topology Report

    1/27

    1

    CHAPTER 1

    INTRODUCTION

    1.1Introduction

    Mesh Network is a network where all the nodes are connected to each other and is a complete

    network. In a Mesh Network every node is connected to other nodes on the network through

    hops. Some are connected through single hops and some may be connected with more than one

    hope. While the data is traveling on the Mesh Network it is automatically configured to reach

    the destination by taking the shortest route which means the least number of hops. Data travels

    by hopping from one node to another and then reaches the destination node in a Mesh

    Topology Network.

    An example of a Mesh Network is the Mobile Adhoc Network or MANet. The entire

    Mesh Network is continuously connected. Being completely connected does not mean that

    Mesh Network is dependant on each and every node of the network. Even if one node fails in

    the Mesh Network the network finds an alternate route to transfer the data. It is called the self

    healing technology where it receives data one way or the other.

    The Mesh Network is based on a very sensible concept and has lesser chances of a

    network breakdown. There are so many possible combinations of routes and hops a data

    transfer can take that it will reach the destination one way or the other. It is highly unlikely that

    all the nodes in a single Mesh Network will break down at any given point of time.

    1.1.1 Wireless Mesh NetworksWireless Mesh Networks work based on the radio frequencies and was originally developed

    by the army to be able to communicate. The reliability factor is high in any kind of Mesh

    Network. There are three types of wireless Mesh Topologies.

    1.1.2 Fixed Mesh Networks

    The fixed Mesh Networks will work only in the specified location and they are not mobile

    networks. They are meant to be used in a limited surrounding with boundaries. The location of

    nodes in affixed Mesh Network is all pre-determined and they are not interchangeable. The

    fixed Mesh Network does not work on line of sight like the other types of Mesh Networks. The

  • 7/28/2019 Mesh Topology Report

    2/27

    2

    total number of hops in a fixed Mesh Network is usually fixed and also short. There may not be

    many nodes as these kinds of Mesh Networks exist within an office or building. More often

    than not the data travels ion a specific direction.

    1.1.3 Peer to Peer Mobile Networks

    In a peer to peer mobile network the individual devices connect to each other using the Mesh

    Network. The peer does not require connecting to the main node and they can still

    communicate from one device to another device by taking the shortest possible data transfer

    route. However many experts believe that in the peer to peer Mesh Networks the problems with

    scalability in terms of time taken for data transfer is questionable. The device has to know to

    transmit the data in the most optimal path and the entire data transfer or depends on this single

    factor. If the device is incapable then the whole purpose of using it in a peer to peer connection

    is lost.

    1.1.4 Node-To-Node Network

    A Node-To-Node network is a combination of fixed Mesh Network and the mobile Mesh

    Network. In the node to node network a network cloud is introduced and all the nodes are

    configured to use the network cloud to connect to each other. So this feature makes it mobile

    and also the network is fixed because all the nodes of the same network connect to one singlenetwork cloud.

  • 7/28/2019 Mesh Topology Report

    3/27

    3

    CHAPTER 2

    HISTORY OF MESH TOPOLOGY

    2.1 History of Mesh Topology

    A wireless mesh network has the core advantage of an inherent ability to form a network on

    power up. Watch what happens in Fig 1, when the mesh nodes power up (green LED on box

    turns on). The nodes hear each other's broadcast and form a network. Also watch what happens

    when a node fails and how the nodes discover an alternate routing path. This healing is fully

    automatic.

    Over the years, wireless mesh networking has seen three unique deployments based on

    radio technology, each incorporating iterative improvements allowing for greater scalability

    and higher network performance - both throughput and latency. This early stage of pre IEEE

    standard technological development is known as first Generation of Wireless Mesh. The

    following deployments are briefly described of various configurations of first generation

    Wireless Mesh Networking:

    Winrich Hoseit of Cologne, Germany first described the "DIRC technology" (digital

    inter relay communication) with PCT patent No. DE 197 37 897 and DE 197 33 586.Because

    transmitted radio waves always interfere, the ratio of carrier to interference first had to be

    worked out. Hoseit also discovered how to prevent latency by transmitting single symbols

    rather than digital packages. (symbol stream switching). Each node collaborates with its

    neighbor-nodes via a control channel (CCH) to choose the frequency, time and energy with

    which to transmit each symbol. Only the final destination "understands" the application with

    the lowest possible latency.

    2.1 History of Mesh Topology in India

    The Indian Financial Network [INFINET] is the communication backbone for the Indian

    Banking and Financial Sector. All banks in the public sector, private sector, cooperative, etc.,

    and the premier financial institutions in the country are eligible to become members of the

    INFINET. The INFINET is a Closed User Group Network for the exclusive use of member

    banks and financial institutions and is the communication backbone for the National Payments

  • 7/28/2019 Mesh Topology Report

    4/27

    4

    System, which caters mainly to inter-bank applications like RTGS, Delivery Vs. Payment ,

    Government Transactions, Automatic Clearing House, etc.

  • 7/28/2019 Mesh Topology Report

    5/27

    5

    CHAPTER 3

    CONCEPT OF MESH TOPOLOGY

    3.1 Concept Overview

    Mesh networking (topology) is a type of networking where each node must not only capture

    and disseminate its own data, but also serve as a relay for other nodes, that is, it must

    collaborate to propagate the data in the network.

    A mesh network can be designed using a flooding technique or a routing technique.

    When using a routing technique, the message is propagated along a path, by hopping from node

    to node until the destination is reached. To ensure all its paths' availability, a routing network

    must allow for continuous connections and reconfiguration around broken or blocked paths,

    using self-healing algorithms.

    A mesh network whose nodes are all connected to each other is a fully connected

    network. Mesh networks can be seen as one type of ad hoc network. Mobile ad hoc networks

    (MANET) and mesh networks are therefore closely related, but MANET also have to deal with

    the problems introduced by the mobility of the nodes.

    The self-healing capability enables a routing based network to operate when one node

    breaks down or a connection goes bad. As a result, the network is typically quite reliable, as

    there is often more than one path between a source and a destination in the network. Although

    mostly used in wireless situations, this concept is also applicable to wired networks and

    software interaction. Wireless mesh networks were originally developed for military

    applications. Mesh networks are typically wireless.

    Over the past decade, the size, cost, and power requirements of radios has declined,

    enabling multiple radios to be contained within a single device, i.e., mesh node, thus allowing

    for greater modularity; each can handle multiple frequency bands and support a variety of

    functions as neededsuch as client access, backhaul service, and scanning even customized

    sets of them. Work in this field has been aided by the use of game theory methods to analyze

    strategies for the allocation of resources and routing of packets.

  • 7/28/2019 Mesh Topology Report

    6/27

    6

    3.2 Topology Types

    The way in which the connections are made is called the topology of the computer network.

    Now I am discussing about network topology, Network topology specifically refers to the

    physical layout of the network, especially the locations of the computers and how the cable is

    run between them.

    Four most common topologies are:

    Bus

    Star

    Ring

    Mesh

    3.2.1 Bus Topology:

    All the devices on a bus topology are connected by one single cable. When one computer sends

    a signal up the wire, all the computers on the network receive the information, but only one

    accepts the information. The rest regrets the message. One computer can send a message at a

    time. A computer must wait until the bus is free before it can transmit. When the signal reaches

    the end of the wire, it bounces back and travels back up the wire. When a signal echoes back

    and forth along an unterminated bus, it is called ringing. To stop the signals from ringing,

    attach terminators at either end of the segment. The terminators absorb the electrical energy and

    stop the reflection.

    Fig. 3.1 Bus topologies

    http://1.bp.blogspot.com/-WNbKMFtl-p0/UA-lBbe9j1I/AAAAAAAAAHs/cpS5V_A1dwk/s1600/bus_topology.jpg
  • 7/28/2019 Mesh Topology Report

    7/27

    7

    Advantage of Bus Network Topology

    1. The bus is simple, reliable in small network, easy to use and understand

    2. Requires the least amount of cable to connect the computers and less expensive

    3. Easy to extend the bus

    Disadvantage of network topology

    1. Heavy network traffic can slow a bus considerably

    2. Each barrel connector weakens the electrical signal

    3. Difficult to troubleshoot a bus

    3.2.2 Star Topology

    All the cables run from the computers to a central location, where they are all connected by a

    device called a hub. Each computer on a star network communicates with a central hub that

    resends the message either to all the computers or only to the destination computers. Hub can

    be active or passive in the star network Active hub regenerates the electrical signal and sends it

    to all the computers connected to it. Passive hub does not amplify or regenerate signal and does

    not require electrical power to run. We can expand a star network by placing another star hub.

    Fig. 3.2 Star Topology

    http://1.bp.blogspot.com/-f1_JocDm57Y/UA-rnslcCCI/AAAAAAAAAIA/jVQ9wo3hIgE/s1600/star+topology.jpg
  • 7/28/2019 Mesh Topology Report

    8/27

    8

    Advantage of Star Network Topology

    1. Center of a star net is a good place to diagnose network faults.

    2. Single computer failure do not necessarily bring down the whole net.

    3. Several cable types can be used with the hub.

    Disadvantage of Star Network topology

    1. Central hub fails, the whole network fails to operate.

    2. Many star networks require a device at the central point to rebroadcast or switch

    network traffic.

    3. Costs more for cabling in star net than bus.

    3.2.3 Ring TopologyEach computer is connected to the next computer, with the last one connected to the first. Every

    computer is connected to the next computer in the ring, and each retransmits what it receives

    from the previous computer. The message flow around the ring in one direction. Some ring

    networks do token passing. It passes around the ring until a computer wishes to send

    information to another computer.

    The computer adds an electronic address and data and sends it around the ring. Each

    computer in sequence receives the token and the information and passes them to the next until

    either the electronic address matches the address of the computer or the token returns to the

    origin. The receiving computer returns a message to the originator indicating that the message

    has been received. The sending computer then creates another token and places it on the

    network, allowing another station to capture the token and being transmitted.

    Fig. 3.3 Ring Topology

    http://1.bp.blogspot.com/-5yh0peyUJig/UA-t77rV09I/AAAAAAAAAIM/ceKhsjWCCPs/s1600/RingTopology[1].jpg
  • 7/28/2019 Mesh Topology Report

    9/27

    9

    Advantage of Ring Network Topology

    1. No computer can monopolize the network

    2. The fair sharing of the network allows the net to degrade gracefully as more users are

    added.

    Disadvantage of Ring Network Topology

    1. Failure of one compute can affect the total network

    2. Difficult to troubleshoot

    3. Adding or removing Computers disrupts the network

    3.2.4 Mesh Topology

    The mesh topology connects all devices (nodes) to each other for redundancy and fault

    tolerance. It is used in WANs to interconnect LANs and for mission critical networks like those

    used by banks and financial institutions. Implementing the mesh topology is expensive and

    difficult.

    Fig. 3.4 Mesh Topology

    http://1.bp.blogspot.com/-L0hOL9Cq4yg/UA-vxKhZNqI/AAAAAAAAAIc/kiEk8AWdqJc/s1600/Mesh-Topology.jpg
  • 7/28/2019 Mesh Topology Report

    10/27

    10

    Advantage of Mesh Network Topology

    1. Fault tolerance.

    2. Guaranteed communication channel capacity.

    3. Easy to troubleshoot.

    Disadvantage of Mesh Network Topology

    1. Difficulty of installation and reconfiguration.

    2. Cost of maintaining redundant link.

  • 7/28/2019 Mesh Topology Report

    11/27

    11

    CHAPTER 4

    TECHNOLOGY INVOLVED IN MESH TOPOLOGY

    4.1 Power minimizing techniques for full mesh topology optical IP networks:In Optical IP networks the power consumption could be reduced via concepts known as Green

    photonics. Adhering to those principles, we use energy savings model which utilizes

    Hibernation mode approach and then investigate its impact on parameters like a wavelength

    request, blocking probability, and heat transfer rate. Trades-off between achieving energy

    savings and network crucial performance parameters are also investigated.

    4.1.1 Corporate Intranet

    Hearing first time the word intranet seemed that it was pronounced wrongly. The correct

    world is internet but then it dawns that the world is right and quite similar to internet yet

    different. Intranet is the amalgam of network and internet. Intranet is used in a closed network

    of an organization.

    Here comes the utility of not only networking but also connectivity to the internet. The

    most important thing is that a corporate is organized through this intranet. Many companies are

    growing on comparatively at a larger scale hence need a mode to communicate with different

    departments and offices.

    Corporate Intranet is designed to provide one platform to gather at this after regular

    intervals. Although different departments of a company were corresponded to each other

    through mailing on internet yet they need a private environment in which only business related

    activities can be monitored. Concept of corporate intranet revolutionized the business world. A

    number of employees, peaceful environment, ease of coordination, browsing for new trends

    and discussing upcoming events and difficulties call for the need of corporate intranet. There

    should be a network in which only work groups are allowed to share companys reports and

    data and also able to communicate through corporate internet for quick updates. A visiblebenefit of corporate intranet is that there is no need of printing and documentation so less use of

    office stationary.

    Now you can inform the employees about the next step through this medium and get

    feedback in the same manner. Saving the time is another positive feature of corporate intranet.

  • 7/28/2019 Mesh Topology Report

    12/27

    12

    Monthly or weekly newsletter of the company provide you better opportunity to take a quick

    decision making step. This enables you to meet the demand of prospect customers.

    4.1.2 Designing Corporate Intranet

    So far designing a corporate intranet concerned few points should be considered as a basic

    infrastructure on which the actual building has to stand. The infrastructure is based on a closed

    network, internet. When all the employees are connected through networking in one group and

    sharing same internet protocol then corporate intranet designed. With the help of this intranet a

    corporate starts sharing one platform. Managing the different departments of corporate in a

    harmonized way so it should be user-friendly and this is the most important feature of corporate

    intranet design. A company with many branches in different cities can design this corporate

    intranet for it convenience and rapid development so that the company prosper by leaps and

    bounds.

    4.1.3 Computer Network Security

    Computer network+ Security = Safe and sound Data

    Computer networking is the interconnectivity of two or more than two PCs in any environment.

    It enables to share files, resource sharing i.e. printers, fax, and storage devices etc. Where

    sharing / networking of many computers are useful there are chances of rising security issue.

    There is need to build such network which is security enabled from malwares to protect

    important data.

    It is an indubitable truth that placing everything in front will cause threat of robbery. So

    it is necessary to take precautionary measurements to avoid the loss of important data. There

    are many possible ways through which a computer network is attacked. These could be an

    internet access point or modems with dial-up connectivity. Here are some lines of attack you

    have to notice for securing your network.

    Installation of anti-virus software is very important for securing computer network. If

    one computer is affected with virus it will destroy the whole computer network by just

    switching on the computers in one network. Many folks are unaware that updating to the

    software new version is needed as there is possibility of new virus attack. An effective antivirus

    program is likely to be upgraded at time automatically. Also there is option that the computer is

    manually compromised so latest version of antivirus should be manually installed.

  • 7/28/2019 Mesh Topology Report

    13/27

    13

    CHAPTER 5

    VIRTUAL NODEALGORITHM

    We propose a virtual node algorithm that allows material to separate along arbitrary (possibly

    branched) piecewise linear paths through a mesh. The material within an element is fragmented

    by creating several replicas of the element and assigning a portion of real material to each

    replica. This results in elements that contain both real material and empty regions. The missing

    material is contained in another copy (or copies) of this element. Our new virtual node

    algorithm automatically determines the number of replicas and the assignment of material to

    each. Moreover, it provides the degrees of freedom required to simulate the partially or fully

    fragmented material in a fashion consistent with the embedded geometry. This approach

    enables efficient simulation of complex geometry with a simple mesh, i.e. the geometry need

    not align itself with element boundaries. It also alleviates many shortcomings of traditional

    Lagrangian simulation techniques for meshes with changing topology. For example, slivers do

    not require small CFL time step restrictions since they are embedded in well-shaped larger

    elements. To enable robust simulation of embedded geometry, we propose new algorithms for

    handling rigid body and self-collisions. In addition, we present several mechanisms for

    influencing and controlling fracture with grain boundaries, prescoring, etc. We illustrate our

    method for both volumetric and thin-shell simulations.

    5.1 Locating Nodes

    Node lookups can proceed asynchronously. The quantity of simultaneous lookups is denoted by

    and is typically three. A node initiates a FIND NODE request by querying to the nodes in

    its own k-buckets that are the closest ones to the desired key.

    When these recipient nodes receive the request, they will look in their k-buckets and

    return the kclosest nodes to the desired key that they know. The requester will update a results

    list with the results (node ID's) he receives, keeping the kbest ones (the k nodes that are closer

    to the searched key) that respond to queries.

  • 7/28/2019 Mesh Topology Report

    14/27

    14

    5.2 Locating resources

    Information is located by mapping it to a key. A hash is typically used for the map. The storer

    nodes will have information due to a previous STORE message. Locating a value follows the

    same procedure as locating the closest nodes to a key, except the search terminates when a

    node has the requested value in his store and returns this value.

    The values are stored at several nodes (k of them) to allow for nodes to come and go

    and still have the value available in some node. Periodically, a node that stores a value will

    explore the network to find the k nodes that are close to the key value and replicate the value

    onto them. This compensates for disappeared nodes.

    5.3 Joining the network

    A node that would like to join the net must first go through a bootstrap process. In this phase,the joining node needs to know the IP address and port of another node - a bootstrap node

    (obtained from the user, or from a stored list) - that is already participating in the Kademlia

    network. If the joining node has not yet participated in the network, it computes a random ID

    number that is supposed not to be already assigned to any other node. It uses this ID until

    leaving the network.

  • 7/28/2019 Mesh Topology Report

    15/27

    15

    CHAPTER 6

    CISCO UNIFIED WIRELESS NETWORK SOLUTION

    6.1 Cisco Unified Wireless Network Solution Overview

    The UWN is designed to provide 802.11 wireless networking solutions for enterprises and

    service providers. The Cisco UWN simplifies deploying and managing large-scale wireless

    LANs and enables a unique best-in-class security infrastructure. The operating system manages

    all data client, communications, and system administration functions, performs Radio Resource

    Management (RRM) functions, manages system-wide mobility policies using the operating

    system Security solution, and coordinates all security functions using the operating system

    security framework.

    The Cisco UWN consists of Cisco wireless LAN controllers and their associated Cisco

    lightweight access points controlled by the operating system. The Cisco UWN supports client

    data services, client monitoring and control, and all rogue access point detection, monitoring,

    and containment functions. The Cisco UWN uses Cisco lightweight access points, Cisco

    wireless LAN controllers, and the optional Cisco WCS to provide wireless services to

    enterprises and service providers.

    6. 2 Cisco Mesh Networking Solution Overview

    The mesh networking solution, which is part of the Cisco unified wireless network solution,

    enables two or more Cisco Aironet lightweight mesh access points (hereafter called mesh

    accesspoints) to communicate with each other over one or more wireless hops to join multiple

    LANs or to extend 802.11b wireless coverage. Cisco mesh access points are configured,

    monitored, and operated from and through any Cisco wireless LAN controller deployed in the

    mesh networking solution.

    The mesh access points are programmed to investigate their environment when they

    boot up, and perform internal configuration based on whether or not the mesh access point has

    a wired connection to the LAN. When the mesh access point is wired to a wireless LAN

  • 7/28/2019 Mesh Topology Report

    16/27

    16

    controller it auto-configures as a roof-top access point, and when the mesh access point is not

    wired to a wireless LAN controller it auto-configures as a pole-top access point.

    The mesh access points are also programmed to find and associate with their nearest

    neighbors when they boot up. Thus, pole-top access points associate with other pole-top access

    points and any roof-top access point that they find, and roof-top access points associate with

    other pole-top access points after associating with a wireless LAN controller. These two design

    features ensure that the mesh networking solution is self-healing when mesh access points are

    installed and when they recover from a power failure.

    In all deployments, the backhaul is carried from one mesh access point to another mesh

    access point across one 802.11 radio, while client access is provided by another 802.11 radio.

    This design ensures that the mesh networking solution throughput is minimally impacted by

    client traffic.

    Typical Cisco Mesh Networking Solution Deployments

    Supported mesh networking solution deployments are of one of three general types:

    Point-to-Point Deployment

    Point-to-Multipoint Deployment

    Mesh Deployment

    6.2.1 Point-to-Point Deployment

    In this simplest configuration, the mesh access points provide wireless access and backhaul to

    wireless clients, and can simultaneously support bridging between one LAN and a termination

    to a remote Ethernet device or another Ethernet LAN.

    Fig. 6.1 Point-to-Point Deployment

  • 7/28/2019 Mesh Topology Report

    17/27

    17

    1 Cisco wireless LAN controller 2 LAN 1

    3 Router or Switch Required

    when network is used for

    bridging LAN at Point 2 and

    LAN at Point 7.

    4 Roof-top access point: Cisco

    Aironet 1030 remote edge

    lightweight access point or Cisco

    Aironet 1500 series lightweight

    outdoor access point.

    5 Wireless Backhaul 6 Pole-top access point Cisco Aironet

    1030 remote edge lightweight

    access point or Cisco Aironet 1500

    series lightweight outdoor access

    point. (See Note)

    7 Optional wired connection to

    Ethernet termination device (such

    as a camera) or LAN 2; requires

    a Router or Switch at Point 3.

    (See Note)

    8 Wireless Clients.

    Note Cisco Aironet 1030 remote edge lightweight access points and Cisco

    Aironet 1500 series lightweight outdoor access points support single-hop

    deployments. However, Cisco Aironet 1500 series lightweight outdoor

    access points are required to support multi-hop backhaul deployments.

    6.2.2 Point-to-Multipoint Deployment

    In this configuration, the mesh access points provide wireless access and backhaul to wireless

    clients, and can simultaneously support bridging between one LAN and one or more

    terminations to Ethernet devices or other Ethernet LANs. Shows a two-hop point-to-multipoint

    deployment.

    Regardless of the number of hops in the point-to-multipoint deployment, the mesh

    access points on each branch are configured to talk only with the mesh access points on their

    branch and not with mesh access points on other branches.

  • 7/28/2019 Mesh Topology Report

    18/27

    18

    Fig. 6.2 Point-to-Multi-Point Deployment

  • 7/28/2019 Mesh Topology Report

    19/27

    19

    1 Cisco wireless LAN

    controller

    2 LAN 1

    3 Router or SwitchRequired

    when network is used for

    bridging LAN at Point 2 and

    LAN at Point 8

    4 Roof-top access point: Cisco Aironet

    1030 remote edge lightweight access

    point or Cisco Aironet 1500 series

    lightweight outdoor access point

    5 Wireless Backhaul 6 Pole-top access point: Cisco Aironet

    1030 remote edge lightweight access

    point or Cisco Aironet 1500 series

    lightweight outdoor access point (See

    Note)

    7 Pole-top access point: Cisco

    Aironet 1500 series

    lightweight outdoor access

    point (See Note)

    8 Optional wired connection to Ethernet

    termination device (such as a camera) or

    LAN 2; requires a Router or Switch at

    Point 3

    9 Wireless clients

    Note Cisco Aironet 1030 remote edge lightweight access points and Cisco

    Aironet 1500 series lightweight outdoor access points support single-hop

    deployments. However, Cisco Aironet 1500 series lightweight outdoor access

    points are required to support multi-hop backhaul deployments.

    6.2.3 Mesh Deployment

    In this configuration, the mesh access points provide wireless access and backhaul to wireless

    clients, and can simultaneously support bridging between one LAN and one or more

    terminations to Ethernet devices or other Ethernet LANs. Shows a typical mesh deployment.

    Regardless of the number of hops in the point-to-multipoint deployment, the mesh access

  • 7/28/2019 Mesh Topology Report

    20/27

    20

    points on each branch are configured to talk to all other mesh access points within range in the

    deployment. Also, when any of the backhaul links fails, the mesh access points automatically

    reroute the traffic using another path. This results in a mesh networking solution that is self-

    configuring and self-healing.

    1 Cisco wireless LAN

    controller

    2 LAN 1

    3 Router or Switch --

    Required when network

    is used for bridging LAN

    at Point 2 and LAN atPoint 7

    4 Roof-top access point:

    Cisco Aironet 1030 remote

    edge lightweight access

    point or Cisco Aironet1500 series lightweight

    outdoor access point

    5 Wireless Backhaul 6 Pole-top access point:

    Cisco Aironet 1500 series

    lightweight outdoor access

    point (Note)

    7 Optional wired

    connection to Ethernet

    termination device (such

    as a camera) or LAN 2;

    requires a Router orSwitch at Point 3

    8 Wireless clients

  • 7/28/2019 Mesh Topology Report

    21/27

    21

    Fig. 6.3 Mesh Deployment

  • 7/28/2019 Mesh Topology Report

    22/27

    22

    CHAPTER 7

    ADVANTAGES

    7.1Advantage of Mesh Topology:

    1. Data can be transmitted from different devices simultaneously. This topology can

    withstand high traffic

    2. Even if one of the components fails there is always an alternative present. So data

    transfer doesnt get affected.

    3. Expansion and modification in topology can be done without disrupting other nodes.

  • 7/28/2019 Mesh Topology Report

    23/27

    23

    CHAPTER 8

    DISADVANTAGES

    8.1 Disadvantages of Mesh Topology:1.There are high chances of redundancy in many of the network connections.

    2.Overall cost of this network is way too high as compared to other network topologies.

    3.Set-up and maintenance of this topology is very difficult. Even administration of the

    network is tough.

  • 7/28/2019 Mesh Topology Report

    24/27

    24

    CHAPTER 9

    LIMITATIONS

    9.1 Limitations

    If the network covers a great area, huge investments may be required due to the amount

    of cabling and ports required for input and output devices. It is a rare choice of a

    network connection due to the costs involved.

    Implementation can be a very arduous task.

  • 7/28/2019 Mesh Topology Report

    25/27

    25

    CHAPTER 10

    FUTURE ASPECTS

    10.1 Future Aspects

    1. Point to point line configuration makes identification and isolation of faults easy.

    2. Messages travel through a dedicated line meaning that only the intended recipient receives

    the message: privacy and security is thus ensured.

    3. In the case of a fault in one link, only the communication between the two devices sharing

    the link is affected.

    4. The use of dedicated links ensures that each connection carries its own data load thus

    ridding of traffic problems that would have been encountered if a connection/link was

    shared.

    5. Since the message travels along dedicated link, mesh topology is more secure.

  • 7/28/2019 Mesh Topology Report

    26/27

    26

    CHAPTER 11

    CONCLUSION

    In Mesh technology there is dedicated links for each node this eliminates the traffic problem.

    Its robust if one link fails it does not affect the other links. Security and privacy due to

    dedicated links. Point-to-point links make fault identification easy. Each connection can have

    its own data load, so the traffic problem is eliminated.Each connection can have its own dataload, so the traffic problem is eliminated. It has multiple links, so if one route is blocked then

    other routes can be used for data communication.Star topology is less expensive than a meshtopology as there are no dedicated links between nodes and each device needs only one link

    and one I/O ports to connect it to any number of nodes.

  • 7/28/2019 Mesh Topology Report

    27/27

    REFERENCES

    1. http://en.wikipedia.org/wiki/MeshTopology

    2.ATIS Telecom Glossary 2007.Alliance for Telecommunications Industry Solutions.

    3. http://www.atis.org/glossary/definition.aspx?id=3516. Retrieved 2008-10-10.

    4. 3. Bicsi, B., (2002). Network Design Basics for Cabling Professionals. City: McGraw-

    Hill Professional.

    5. Inc., S., (2002). Networking Complete. Third Edition. San Francisco: Sybex

    http://en.wikipedia.org/wiki/Meshhttp://en.wikipedia.org/wiki/Meshhttp://en.wikipedia.org/wiki/Alliance_for_Telecommunications_Industry_Solutionshttp://en.wikipedia.org/wiki/Alliance_for_Telecommunications_Industry_Solutionshttp://en.wikipedia.org/wiki/Alliance_for_Telecommunications_Industry_Solutionshttp://en.wikipedia.org/wiki/Alliance_for_Telecommunications_Industry_Solutionshttp://en.wikipedia.org/wiki/Mesh