Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Network Topology

Posted on by

Network Topology is the physical and logical arrangement of the nodes and links in a Computer Network. Nodes are the compute devices that connect to the network and links are the medium that connect the nodes. The network topology depicts that structure of the network along with the nodes and links. Network Topology application of Graph Theory.

The physical topology is the physical connection of the nodes and links in the network topology.

The logical topology is the logical representation of the data flow between the nodes through the links in the network topology.

Each LAN technologies follows a unique Network Topology.

Types of Network Topology

Bus Topology connects all nodes in a line. The data flow happens between each node directly. Hub is example of Bus topology.

Star Topology connects all the nodes through a central node. The data flow happens through a central node. Switched Network is an example of Star topology.

Ring Topology connects all the nodes through a ring. The data flow happens through a ring. Each node has two peers. Token Rink Swit

Mesh Topology connects all the nodes through a mesh. Each node in the topology is connected to each other directly. Each node sends data to other node directly.

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme