Upload
rahul-garg
View
222
Download
1
Embed Size (px)
Citation preview
7/28/2019 Mesh Topology Report
1/27
1
CHAPTER 1
INTRODUCTION
1.1Introduction
Mesh Network is a network where all the nodes are connected to each other and is a complete
network. In a Mesh Network every node is connected to other nodes on the network through
hops. Some are connected through single hops and some may be connected with more than one
hope. While the data is traveling on the Mesh Network it is automatically configured to reach
the destination by taking the shortest route which means the least number of hops. Data travels
by hopping from one node to another and then reaches the destination node in a Mesh
Topology Network.
An example of a Mesh Network is the Mobile Adhoc Network or MANet. The entire
Mesh Network is continuously connected. Being completely connected does not mean that
Mesh Network is dependant on each and every node of the network. Even if one node fails in
the Mesh Network the network finds an alternate route to transfer the data. It is called the self
healing technology where it receives data one way or the other.
The Mesh Network is based on a very sensible concept and has lesser chances of a
network breakdown. There are so many possible combinations of routes and hops a data
transfer can take that it will reach the destination one way or the other. It is highly unlikely that
all the nodes in a single Mesh Network will break down at any given point of time.
1.1.1 Wireless Mesh NetworksWireless Mesh Networks work based on the radio frequencies and was originally developed
by the army to be able to communicate. The reliability factor is high in any kind of Mesh
Network. There are three types of wireless Mesh Topologies.
1.1.2 Fixed Mesh Networks
The fixed Mesh Networks will work only in the specified location and they are not mobile
networks. They are meant to be used in a limited surrounding with boundaries. The location of
nodes in affixed Mesh Network is all pre-determined and they are not interchangeable. The
fixed Mesh Network does not work on line of sight like the other types of Mesh Networks. The
7/28/2019 Mesh Topology Report
2/27
2
total number of hops in a fixed Mesh Network is usually fixed and also short. There may not be
many nodes as these kinds of Mesh Networks exist within an office or building. More often
than not the data travels ion a specific direction.
1.1.3 Peer to Peer Mobile Networks
In a peer to peer mobile network the individual devices connect to each other using the Mesh
Network. The peer does not require connecting to the main node and they can still
communicate from one device to another device by taking the shortest possible data transfer
route. However many experts believe that in the peer to peer Mesh Networks the problems with
scalability in terms of time taken for data transfer is questionable. The device has to know to
transmit the data in the most optimal path and the entire data transfer or depends on this single
factor. If the device is incapable then the whole purpose of using it in a peer to peer connection
is lost.
1.1.4 Node-To-Node Network
A Node-To-Node network is a combination of fixed Mesh Network and the mobile Mesh
Network. In the node to node network a network cloud is introduced and all the nodes are
configured to use the network cloud to connect to each other. So this feature makes it mobile
and also the network is fixed because all the nodes of the same network connect to one singlenetwork cloud.
7/28/2019 Mesh Topology Report
3/27
3
CHAPTER 2
HISTORY OF MESH TOPOLOGY
2.1 History of Mesh Topology
A wireless mesh network has the core advantage of an inherent ability to form a network on
power up. Watch what happens in Fig 1, when the mesh nodes power up (green LED on box
turns on). The nodes hear each other's broadcast and form a network. Also watch what happens
when a node fails and how the nodes discover an alternate routing path. This healing is fully
automatic.
Over the years, wireless mesh networking has seen three unique deployments based on
radio technology, each incorporating iterative improvements allowing for greater scalability
and higher network performance - both throughput and latency. This early stage of pre IEEE
standard technological development is known as first Generation of Wireless Mesh. The
following deployments are briefly described of various configurations of first generation
Wireless Mesh Networking:
Winrich Hoseit of Cologne, Germany first described the "DIRC technology" (digital
inter relay communication) with PCT patent No. DE 197 37 897 and DE 197 33 586.Because
transmitted radio waves always interfere, the ratio of carrier to interference first had to be
worked out. Hoseit also discovered how to prevent latency by transmitting single symbols
rather than digital packages. (symbol stream switching). Each node collaborates with its
neighbor-nodes via a control channel (CCH) to choose the frequency, time and energy with
which to transmit each symbol. Only the final destination "understands" the application with
the lowest possible latency.
2.1 History of Mesh Topology in India
The Indian Financial Network [INFINET] is the communication backbone for the Indian
Banking and Financial Sector. All banks in the public sector, private sector, cooperative, etc.,
and the premier financial institutions in the country are eligible to become members of the
INFINET. The INFINET is a Closed User Group Network for the exclusive use of member
banks and financial institutions and is the communication backbone for the National Payments
7/28/2019 Mesh Topology Report
4/27
4
System, which caters mainly to inter-bank applications like RTGS, Delivery Vs. Payment ,
Government Transactions, Automatic Clearing House, etc.
7/28/2019 Mesh Topology Report
5/27
5
CHAPTER 3
CONCEPT OF MESH TOPOLOGY
3.1 Concept Overview
Mesh networking (topology) is a type of networking where each node must not only capture
and disseminate its own data, but also serve as a relay for other nodes, that is, it must
collaborate to propagate the data in the network.
A mesh network can be designed using a flooding technique or a routing technique.
When using a routing technique, the message is propagated along a path, by hopping from node
to node until the destination is reached. To ensure all its paths' availability, a routing network
must allow for continuous connections and reconfiguration around broken or blocked paths,
using self-healing algorithms.
A mesh network whose nodes are all connected to each other is a fully connected
network. Mesh networks can be seen as one type of ad hoc network. Mobile ad hoc networks
(MANET) and mesh networks are therefore closely related, but MANET also have to deal with
the problems introduced by the mobility of the nodes.
The self-healing capability enables a routing based network to operate when one node
breaks down or a connection goes bad. As a result, the network is typically quite reliable, as
there is often more than one path between a source and a destination in the network. Although
mostly used in wireless situations, this concept is also applicable to wired networks and
software interaction. Wireless mesh networks were originally developed for military
applications. Mesh networks are typically wireless.
Over the past decade, the size, cost, and power requirements of radios has declined,
enabling multiple radios to be contained within a single device, i.e., mesh node, thus allowing
for greater modularity; each can handle multiple frequency bands and support a variety of
functions as neededsuch as client access, backhaul service, and scanning even customized
sets of them. Work in this field has been aided by the use of game theory methods to analyze
strategies for the allocation of resources and routing of packets.
7/28/2019 Mesh Topology Report
6/27
6
3.2 Topology Types
The way in which the connections are made is called the topology of the computer network.
Now I am discussing about network topology, Network topology specifically refers to the
physical layout of the network, especially the locations of the computers and how the cable is
run between them.
Four most common topologies are:
Bus
Star
Ring
Mesh
3.2.1 Bus Topology:
All the devices on a bus topology are connected by one single cable. When one computer sends
a signal up the wire, all the computers on the network receive the information, but only one
accepts the information. The rest regrets the message. One computer can send a message at a
time. A computer must wait until the bus is free before it can transmit. When the signal reaches
the end of the wire, it bounces back and travels back up the wire. When a signal echoes back
and forth along an unterminated bus, it is called ringing. To stop the signals from ringing,
attach terminators at either end of the segment. The terminators absorb the electrical energy and
stop the reflection.
Fig. 3.1 Bus topologies
http://1.bp.blogspot.com/-WNbKMFtl-p0/UA-lBbe9j1I/AAAAAAAAAHs/cpS5V_A1dwk/s1600/bus_topology.jpg7/28/2019 Mesh Topology Report
7/27
7
Advantage of Bus Network Topology
1. The bus is simple, reliable in small network, easy to use and understand
2. Requires the least amount of cable to connect the computers and less expensive
3. Easy to extend the bus
Disadvantage of network topology
1. Heavy network traffic can slow a bus considerably
2. Each barrel connector weakens the electrical signal
3. Difficult to troubleshoot a bus
3.2.2 Star Topology
All the cables run from the computers to a central location, where they are all connected by a
device called a hub. Each computer on a star network communicates with a central hub that
resends the message either to all the computers or only to the destination computers. Hub can
be active or passive in the star network Active hub regenerates the electrical signal and sends it
to all the computers connected to it. Passive hub does not amplify or regenerate signal and does
not require electrical power to run. We can expand a star network by placing another star hub.
Fig. 3.2 Star Topology
http://1.bp.blogspot.com/-f1_JocDm57Y/UA-rnslcCCI/AAAAAAAAAIA/jVQ9wo3hIgE/s1600/star+topology.jpg7/28/2019 Mesh Topology Report
8/27
8
Advantage of Star Network Topology
1. Center of a star net is a good place to diagnose network faults.
2. Single computer failure do not necessarily bring down the whole net.
3. Several cable types can be used with the hub.
Disadvantage of Star Network topology
1. Central hub fails, the whole network fails to operate.
2. Many star networks require a device at the central point to rebroadcast or switch
network traffic.
3. Costs more for cabling in star net than bus.
3.2.3 Ring TopologyEach computer is connected to the next computer, with the last one connected to the first. Every
computer is connected to the next computer in the ring, and each retransmits what it receives
from the previous computer. The message flow around the ring in one direction. Some ring
networks do token passing. It passes around the ring until a computer wishes to send
information to another computer.
The computer adds an electronic address and data and sends it around the ring. Each
computer in sequence receives the token and the information and passes them to the next until
either the electronic address matches the address of the computer or the token returns to the
origin. The receiving computer returns a message to the originator indicating that the message
has been received. The sending computer then creates another token and places it on the
network, allowing another station to capture the token and being transmitted.
Fig. 3.3 Ring Topology
http://1.bp.blogspot.com/-5yh0peyUJig/UA-t77rV09I/AAAAAAAAAIM/ceKhsjWCCPs/s1600/RingTopology[1].jpg7/28/2019 Mesh Topology Report
9/27
9
Advantage of Ring Network Topology
1. No computer can monopolize the network
2. The fair sharing of the network allows the net to degrade gracefully as more users are
added.
Disadvantage of Ring Network Topology
1. Failure of one compute can affect the total network
2. Difficult to troubleshoot
3. Adding or removing Computers disrupts the network
3.2.4 Mesh Topology
The mesh topology connects all devices (nodes) to each other for redundancy and fault
tolerance. It is used in WANs to interconnect LANs and for mission critical networks like those
used by banks and financial institutions. Implementing the mesh topology is expensive and
difficult.
Fig. 3.4 Mesh Topology
http://1.bp.blogspot.com/-L0hOL9Cq4yg/UA-vxKhZNqI/AAAAAAAAAIc/kiEk8AWdqJc/s1600/Mesh-Topology.jpg7/28/2019 Mesh Topology Report
10/27
10
Advantage of Mesh Network Topology
1. Fault tolerance.
2. Guaranteed communication channel capacity.
3. Easy to troubleshoot.
Disadvantage of Mesh Network Topology
1. Difficulty of installation and reconfiguration.
2. Cost of maintaining redundant link.
7/28/2019 Mesh Topology Report
11/27
11
CHAPTER 4
TECHNOLOGY INVOLVED IN MESH TOPOLOGY
4.1 Power minimizing techniques for full mesh topology optical IP networks:In Optical IP networks the power consumption could be reduced via concepts known as Green
photonics. Adhering to those principles, we use energy savings model which utilizes
Hibernation mode approach and then investigate its impact on parameters like a wavelength
request, blocking probability, and heat transfer rate. Trades-off between achieving energy
savings and network crucial performance parameters are also investigated.
4.1.1 Corporate Intranet
Hearing first time the word intranet seemed that it was pronounced wrongly. The correct
world is internet but then it dawns that the world is right and quite similar to internet yet
different. Intranet is the amalgam of network and internet. Intranet is used in a closed network
of an organization.
Here comes the utility of not only networking but also connectivity to the internet. The
most important thing is that a corporate is organized through this intranet. Many companies are
growing on comparatively at a larger scale hence need a mode to communicate with different
departments and offices.
Corporate Intranet is designed to provide one platform to gather at this after regular
intervals. Although different departments of a company were corresponded to each other
through mailing on internet yet they need a private environment in which only business related
activities can be monitored. Concept of corporate intranet revolutionized the business world. A
number of employees, peaceful environment, ease of coordination, browsing for new trends
and discussing upcoming events and difficulties call for the need of corporate intranet. There
should be a network in which only work groups are allowed to share companys reports and
data and also able to communicate through corporate internet for quick updates. A visiblebenefit of corporate intranet is that there is no need of printing and documentation so less use of
office stationary.
Now you can inform the employees about the next step through this medium and get
feedback in the same manner. Saving the time is another positive feature of corporate intranet.
7/28/2019 Mesh Topology Report
12/27
12
Monthly or weekly newsletter of the company provide you better opportunity to take a quick
decision making step. This enables you to meet the demand of prospect customers.
4.1.2 Designing Corporate Intranet
So far designing a corporate intranet concerned few points should be considered as a basic
infrastructure on which the actual building has to stand. The infrastructure is based on a closed
network, internet. When all the employees are connected through networking in one group and
sharing same internet protocol then corporate intranet designed. With the help of this intranet a
corporate starts sharing one platform. Managing the different departments of corporate in a
harmonized way so it should be user-friendly and this is the most important feature of corporate
intranet design. A company with many branches in different cities can design this corporate
intranet for it convenience and rapid development so that the company prosper by leaps and
bounds.
4.1.3 Computer Network Security
Computer network+ Security = Safe and sound Data
Computer networking is the interconnectivity of two or more than two PCs in any environment.
It enables to share files, resource sharing i.e. printers, fax, and storage devices etc. Where
sharing / networking of many computers are useful there are chances of rising security issue.
There is need to build such network which is security enabled from malwares to protect
important data.
It is an indubitable truth that placing everything in front will cause threat of robbery. So
it is necessary to take precautionary measurements to avoid the loss of important data. There
are many possible ways through which a computer network is attacked. These could be an
internet access point or modems with dial-up connectivity. Here are some lines of attack you
have to notice for securing your network.
Installation of anti-virus software is very important for securing computer network. If
one computer is affected with virus it will destroy the whole computer network by just
switching on the computers in one network. Many folks are unaware that updating to the
software new version is needed as there is possibility of new virus attack. An effective antivirus
program is likely to be upgraded at time automatically. Also there is option that the computer is
manually compromised so latest version of antivirus should be manually installed.
7/28/2019 Mesh Topology Report
13/27
13
CHAPTER 5
VIRTUAL NODEALGORITHM
We propose a virtual node algorithm that allows material to separate along arbitrary (possibly
branched) piecewise linear paths through a mesh. The material within an element is fragmented
by creating several replicas of the element and assigning a portion of real material to each
replica. This results in elements that contain both real material and empty regions. The missing
material is contained in another copy (or copies) of this element. Our new virtual node
algorithm automatically determines the number of replicas and the assignment of material to
each. Moreover, it provides the degrees of freedom required to simulate the partially or fully
fragmented material in a fashion consistent with the embedded geometry. This approach
enables efficient simulation of complex geometry with a simple mesh, i.e. the geometry need
not align itself with element boundaries. It also alleviates many shortcomings of traditional
Lagrangian simulation techniques for meshes with changing topology. For example, slivers do
not require small CFL time step restrictions since they are embedded in well-shaped larger
elements. To enable robust simulation of embedded geometry, we propose new algorithms for
handling rigid body and self-collisions. In addition, we present several mechanisms for
influencing and controlling fracture with grain boundaries, prescoring, etc. We illustrate our
method for both volumetric and thin-shell simulations.
5.1 Locating Nodes
Node lookups can proceed asynchronously. The quantity of simultaneous lookups is denoted by
and is typically three. A node initiates a FIND NODE request by querying to the nodes in
its own k-buckets that are the closest ones to the desired key.
When these recipient nodes receive the request, they will look in their k-buckets and
return the kclosest nodes to the desired key that they know. The requester will update a results
list with the results (node ID's) he receives, keeping the kbest ones (the k nodes that are closer
to the searched key) that respond to queries.
7/28/2019 Mesh Topology Report
14/27
14
5.2 Locating resources
Information is located by mapping it to a key. A hash is typically used for the map. The storer
nodes will have information due to a previous STORE message. Locating a value follows the
same procedure as locating the closest nodes to a key, except the search terminates when a
node has the requested value in his store and returns this value.
The values are stored at several nodes (k of them) to allow for nodes to come and go
and still have the value available in some node. Periodically, a node that stores a value will
explore the network to find the k nodes that are close to the key value and replicate the value
onto them. This compensates for disappeared nodes.
5.3 Joining the network
A node that would like to join the net must first go through a bootstrap process. In this phase,the joining node needs to know the IP address and port of another node - a bootstrap node
(obtained from the user, or from a stored list) - that is already participating in the Kademlia
network. If the joining node has not yet participated in the network, it computes a random ID
number that is supposed not to be already assigned to any other node. It uses this ID until
leaving the network.
7/28/2019 Mesh Topology Report
15/27
15
CHAPTER 6
CISCO UNIFIED WIRELESS NETWORK SOLUTION
6.1 Cisco Unified Wireless Network Solution Overview
The UWN is designed to provide 802.11 wireless networking solutions for enterprises and
service providers. The Cisco UWN simplifies deploying and managing large-scale wireless
LANs and enables a unique best-in-class security infrastructure. The operating system manages
all data client, communications, and system administration functions, performs Radio Resource
Management (RRM) functions, manages system-wide mobility policies using the operating
system Security solution, and coordinates all security functions using the operating system
security framework.
The Cisco UWN consists of Cisco wireless LAN controllers and their associated Cisco
lightweight access points controlled by the operating system. The Cisco UWN supports client
data services, client monitoring and control, and all rogue access point detection, monitoring,
and containment functions. The Cisco UWN uses Cisco lightweight access points, Cisco
wireless LAN controllers, and the optional Cisco WCS to provide wireless services to
enterprises and service providers.
6. 2 Cisco Mesh Networking Solution Overview
The mesh networking solution, which is part of the Cisco unified wireless network solution,
enables two or more Cisco Aironet lightweight mesh access points (hereafter called mesh
accesspoints) to communicate with each other over one or more wireless hops to join multiple
LANs or to extend 802.11b wireless coverage. Cisco mesh access points are configured,
monitored, and operated from and through any Cisco wireless LAN controller deployed in the
mesh networking solution.
The mesh access points are programmed to investigate their environment when they
boot up, and perform internal configuration based on whether or not the mesh access point has
a wired connection to the LAN. When the mesh access point is wired to a wireless LAN
7/28/2019 Mesh Topology Report
16/27
16
controller it auto-configures as a roof-top access point, and when the mesh access point is not
wired to a wireless LAN controller it auto-configures as a pole-top access point.
The mesh access points are also programmed to find and associate with their nearest
neighbors when they boot up. Thus, pole-top access points associate with other pole-top access
points and any roof-top access point that they find, and roof-top access points associate with
other pole-top access points after associating with a wireless LAN controller. These two design
features ensure that the mesh networking solution is self-healing when mesh access points are
installed and when they recover from a power failure.
In all deployments, the backhaul is carried from one mesh access point to another mesh
access point across one 802.11 radio, while client access is provided by another 802.11 radio.
This design ensures that the mesh networking solution throughput is minimally impacted by
client traffic.
Typical Cisco Mesh Networking Solution Deployments
Supported mesh networking solution deployments are of one of three general types:
Point-to-Point Deployment
Point-to-Multipoint Deployment
Mesh Deployment
6.2.1 Point-to-Point Deployment
In this simplest configuration, the mesh access points provide wireless access and backhaul to
wireless clients, and can simultaneously support bridging between one LAN and a termination
to a remote Ethernet device or another Ethernet LAN.
Fig. 6.1 Point-to-Point Deployment
7/28/2019 Mesh Topology Report
17/27
17
1 Cisco wireless LAN controller 2 LAN 1
3 Router or Switch Required
when network is used for
bridging LAN at Point 2 and
LAN at Point 7.
4 Roof-top access point: Cisco
Aironet 1030 remote edge
lightweight access point or Cisco
Aironet 1500 series lightweight
outdoor access point.
5 Wireless Backhaul 6 Pole-top access point Cisco Aironet
1030 remote edge lightweight
access point or Cisco Aironet 1500
series lightweight outdoor access
point. (See Note)
7 Optional wired connection to
Ethernet termination device (such
as a camera) or LAN 2; requires
a Router or Switch at Point 3.
(See Note)
8 Wireless Clients.
Note Cisco Aironet 1030 remote edge lightweight access points and Cisco
Aironet 1500 series lightweight outdoor access points support single-hop
deployments. However, Cisco Aironet 1500 series lightweight outdoor
access points are required to support multi-hop backhaul deployments.
6.2.2 Point-to-Multipoint Deployment
In this configuration, the mesh access points provide wireless access and backhaul to wireless
clients, and can simultaneously support bridging between one LAN and one or more
terminations to Ethernet devices or other Ethernet LANs. Shows a two-hop point-to-multipoint
deployment.
Regardless of the number of hops in the point-to-multipoint deployment, the mesh
access points on each branch are configured to talk only with the mesh access points on their
branch and not with mesh access points on other branches.
7/28/2019 Mesh Topology Report
18/27
18
Fig. 6.2 Point-to-Multi-Point Deployment
7/28/2019 Mesh Topology Report
19/27
19
1 Cisco wireless LAN
controller
2 LAN 1
3 Router or SwitchRequired
when network is used for
bridging LAN at Point 2 and
LAN at Point 8
4 Roof-top access point: Cisco Aironet
1030 remote edge lightweight access
point or Cisco Aironet 1500 series
lightweight outdoor access point
5 Wireless Backhaul 6 Pole-top access point: Cisco Aironet
1030 remote edge lightweight access
point or Cisco Aironet 1500 series
lightweight outdoor access point (See
Note)
7 Pole-top access point: Cisco
Aironet 1500 series
lightweight outdoor access
point (See Note)
8 Optional wired connection to Ethernet
termination device (such as a camera) or
LAN 2; requires a Router or Switch at
Point 3
9 Wireless clients
Note Cisco Aironet 1030 remote edge lightweight access points and Cisco
Aironet 1500 series lightweight outdoor access points support single-hop
deployments. However, Cisco Aironet 1500 series lightweight outdoor access
points are required to support multi-hop backhaul deployments.
6.2.3 Mesh Deployment
In this configuration, the mesh access points provide wireless access and backhaul to wireless
clients, and can simultaneously support bridging between one LAN and one or more
terminations to Ethernet devices or other Ethernet LANs. Shows a typical mesh deployment.
Regardless of the number of hops in the point-to-multipoint deployment, the mesh access
7/28/2019 Mesh Topology Report
20/27
20
points on each branch are configured to talk to all other mesh access points within range in the
deployment. Also, when any of the backhaul links fails, the mesh access points automatically
reroute the traffic using another path. This results in a mesh networking solution that is self-
configuring and self-healing.
1 Cisco wireless LAN
controller
2 LAN 1
3 Router or Switch --
Required when network
is used for bridging LAN
at Point 2 and LAN atPoint 7
4 Roof-top access point:
Cisco Aironet 1030 remote
edge lightweight access
point or Cisco Aironet1500 series lightweight
outdoor access point
5 Wireless Backhaul 6 Pole-top access point:
Cisco Aironet 1500 series
lightweight outdoor access
point (Note)
7 Optional wired
connection to Ethernet
termination device (such
as a camera) or LAN 2;
requires a Router orSwitch at Point 3
8 Wireless clients
7/28/2019 Mesh Topology Report
21/27
21
Fig. 6.3 Mesh Deployment
7/28/2019 Mesh Topology Report
22/27
22
CHAPTER 7
ADVANTAGES
7.1Advantage of Mesh Topology:
1. Data can be transmitted from different devices simultaneously. This topology can
withstand high traffic
2. Even if one of the components fails there is always an alternative present. So data
transfer doesnt get affected.
3. Expansion and modification in topology can be done without disrupting other nodes.
7/28/2019 Mesh Topology Report
23/27
23
CHAPTER 8
DISADVANTAGES
8.1 Disadvantages of Mesh Topology:1.There are high chances of redundancy in many of the network connections.
2.Overall cost of this network is way too high as compared to other network topologies.
3.Set-up and maintenance of this topology is very difficult. Even administration of the
network is tough.
7/28/2019 Mesh Topology Report
24/27
24
CHAPTER 9
LIMITATIONS
9.1 Limitations
If the network covers a great area, huge investments may be required due to the amount
of cabling and ports required for input and output devices. It is a rare choice of a
network connection due to the costs involved.
Implementation can be a very arduous task.
7/28/2019 Mesh Topology Report
25/27
25
CHAPTER 10
FUTURE ASPECTS
10.1 Future Aspects
1. Point to point line configuration makes identification and isolation of faults easy.
2. Messages travel through a dedicated line meaning that only the intended recipient receives
the message: privacy and security is thus ensured.
3. In the case of a fault in one link, only the communication between the two devices sharing
the link is affected.
4. The use of dedicated links ensures that each connection carries its own data load thus
ridding of traffic problems that would have been encountered if a connection/link was
shared.
5. Since the message travels along dedicated link, mesh topology is more secure.
7/28/2019 Mesh Topology Report
26/27
26
CHAPTER 11
CONCLUSION
In Mesh technology there is dedicated links for each node this eliminates the traffic problem.
Its robust if one link fails it does not affect the other links. Security and privacy due to
dedicated links. Point-to-point links make fault identification easy. Each connection can have
its own data load, so the traffic problem is eliminated.Each connection can have its own dataload, so the traffic problem is eliminated. It has multiple links, so if one route is blocked then
other routes can be used for data communication.Star topology is less expensive than a meshtopology as there are no dedicated links between nodes and each device needs only one link
and one I/O ports to connect it to any number of nodes.
7/28/2019 Mesh Topology Report
27/27
REFERENCES
1. http://en.wikipedia.org/wiki/MeshTopology
2.ATIS Telecom Glossary 2007.Alliance for Telecommunications Industry Solutions.
3. http://www.atis.org/glossary/definition.aspx?id=3516. Retrieved 2008-10-10.
4. 3. Bicsi, B., (2002). Network Design Basics for Cabling Professionals. City: McGraw-
Hill Professional.
5. Inc., S., (2002). Networking Complete. Third Edition. San Francisco: Sybex
http://en.wikipedia.org/wiki/Meshhttp://en.wikipedia.org/wiki/Meshhttp://en.wikipedia.org/wiki/Alliance_for_Telecommunications_Industry_Solutionshttp://en.wikipedia.org/wiki/Alliance_for_Telecommunications_Industry_Solutionshttp://en.wikipedia.org/wiki/Alliance_for_Telecommunications_Industry_Solutionshttp://en.wikipedia.org/wiki/Alliance_for_Telecommunications_Industry_Solutionshttp://en.wikipedia.org/wiki/Mesh