ISSN 2278-9723
 

Technical Note 


A Secondary Study Examining the Effectiveness of Network Topologies: The Case of Ring, Bus, and Star Topologies

KELIWAR S..

Abstract
Topologies arise from the practice of design development. Notably, network topologies refer to the manner in which nodes are connect to foster an interaction. Specifically, topologies constitute network structures that define the process through which nodes communicate. This paper focuses on the bus, ring, and star topologies, examining their performance strengths and demerits.

Key words: Topologies constitute network structures, star topology, bus, ring, strengths and demerits.


 
ARTICLE TOOLS
Abstract
PDF Fulltext
How to cite this articleHow to cite this article
Citation Tools
Related Records
 Articles by KELIWAR S.
on Google
on Google Scholar


How to Cite this Article
Pubmed Style

KELIWAR S.. A Secondary Study Examining the Effectiveness of Network Topologies: The Case of Ring, Bus, and Star Topologies. . 2020; 8(2): 5-7. doi:10.31838/ijccts/08.02.02


Web Style

KELIWAR S.. A Secondary Study Examining the Effectiveness of Network Topologies: The Case of Ring, Bus, and Star Topologies. http://www.ijccts.org/?mno=92480 [Access: September 19, 2020]. doi:10.31838/ijccts/08.02.02


AMA (American Medical Association) Style

KELIWAR S.. A Secondary Study Examining the Effectiveness of Network Topologies: The Case of Ring, Bus, and Star Topologies. . 2020; 8(2): 5-7. doi:10.31838/ijccts/08.02.02



Vancouver/ICMJE Style

KELIWAR S.. A Secondary Study Examining the Effectiveness of Network Topologies: The Case of Ring, Bus, and Star Topologies. . (2020), [cited September 19, 2020]; 8(2): 5-7. doi:10.31838/ijccts/08.02.02



Harvard Style

KELIWAR S. (2020) A Secondary Study Examining the Effectiveness of Network Topologies: The Case of Ring, Bus, and Star Topologies. , 8 (2), 5-7. doi:10.31838/ijccts/08.02.02



Turabian Style

KELIWAR S.. 2020. A Secondary Study Examining the Effectiveness of Network Topologies: The Case of Ring, Bus, and Star Topologies. International Journal of Communication and Computer Technologies, 8 (2), 5-7. doi:10.31838/ijccts/08.02.02



Chicago Style

KELIWAR S.. "A Secondary Study Examining the Effectiveness of Network Topologies: The Case of Ring, Bus, and Star Topologies." International Journal of Communication and Computer Technologies 8 (2020), 5-7. doi:10.31838/ijccts/08.02.02



MLA (The Modern Language Association) Style

KELIWAR S.. "A Secondary Study Examining the Effectiveness of Network Topologies: The Case of Ring, Bus, and Star Topologies." International Journal of Communication and Computer Technologies 8.2 (2020), 5-7. Print. doi:10.31838/ijccts/08.02.02



APA (American Psychological Association) Style

KELIWAR S. (2020) A Secondary Study Examining the Effectiveness of Network Topologies: The Case of Ring, Bus, and Star Topologies. International Journal of Communication and Computer Technologies, 8 (2), 5-7. doi:10.31838/ijccts/08.02.02





Most Viewed Articles
  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • Most Downloaded
  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Most Cited Articles