Thursday, August 8, 2019

author photo
Here are 6 Ways to Work Ring Topologies in Computer Networks
Topology Ring

The development of computer networks has made many people use computers in their daily lives. Especially if many computers are used in one room and must be connected to each other. That kind of thing makes computer network topology really needed.

In network topology, many types are used depending on how much and complicated the computer is used. the purpose of making a network topology is to make it easier for technicians to create new networks or predict the costs incurred by SATA connecting computers. One of the topology networks that has been used is Ring Topology. What is a Ring Topology?

In short, Ring Topology is one type of network topology that has a shape like a ring or a circle. This topology has only one network. the data package used must pass through several computers before finally being able to reach the last computer. So from that, this system is called a ring topology or ring or can also be called a circle.

If you want to see what this Ring Topology works like, here's the review.

How the Ring topology works

If you see the explanation mentioned above, we can guess what the workflow looks like. Basically, each computer is connected to each other. One computer serves as a node and several computers are in charge of being repeaters. This repeater is tasked to provide signal strengthening for each node. To find out more details can be seen in the following order.
  1. Each computer is connected to each other
    As mentioned earlier, the working system in the Ring version topology is to connect computers without interruption. It should be underlined that each computer is connected to each other, using the same network. If you use a different network, the data transfer process will experience difficulties.
  2. Data transmission is only done at one point
    The easiest example like this, there are five computers given the initials "A" to the "E" computer. If you want to send data from computer "A" to computer "C", then the data must stop first to the computer "B" to be sent to the computer "C", and vice versa if you want to send the same data.
  3. Data transmission is only one direction
    As mentioned earlier, sending data from computer "A" to computer "C" must be done in stages. Plus, data transmission can only be done in one direction. Examples like this, if you use a computer "E" and want to send it to a computer "A". Still, you have to send data sequentially from the computer "D", "C", until later it reaches the computer "A".
  4. Damage to one computer, data also failed to send
    One weakness that is quite fatal by using this topology system is the difficulty of sending data when one computer is damaged. Just an example like this. You send data from the computer "E" to the computer "B". But the computer "C" is damaged, then automatically, the data cannot be sent. Likewise, if the computer is damaged not from its path, the data cannot be sent anyway. For example, with the same case, but the computer that has been damaged comes from the computer "A", then still the data will not be sent even if it does not pass through the computer.
  5. Computers that can send messages to have tokens
    Maybe you think that every computer that uses this ring topology concept can send messages. In fact, not all computers can send messages at will. Computers that can send data or messages are computers that have tokens. Token here the concept is similar to admin on a website. That is, computers that have these tokens have access to being able to send data and messages to other computers.
  6. The token can be changed by adding an IP address
    Every computer has a different Address ID. To be able to get tokens, one computer that gets the token must send the data to the destination address. of course, you have to go through stages in sequence. After getting a token that comes from a computer token, the computer can send data and messages freely.
That's how to ring topology works in computer networks. The advantages and disadvantages of Ring Topology can be seen from how it works. The main advantage of this type of topology lies in the ease of installation. Plus, the cost is quite cheap.

But from the disadvantages, the process of data used is quite complicated. Especially to get the desired data must go through various other computers before it can be accepted. This makes the time obtained is long enough.

Therefore, this Ring topology has been considered difficult to apply today. Some computer networks that are used today are mostly star types and tree topologies. Hopefully, this article can be the best reference for you.

This post have 0 comments

Next article Next Post
This Is The Oldest Page