wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Mesh Topology

profile
Anjali Gupta
Aug 29, 2022
0 Likes
0 Discussions
144 Reads

In this layout, every system is connected to every other system. The main advantage of this topology is high availability. The main disadvantage of this topology is cost, both administrative and physical. Because each system is connected to each other, the amount of cabling and maintenance necessary can be prohibitive, especially in larger networks.

This topology is mainly used in Wide Area Network environments or in environments where high availability outweighs the costs associated with this amount of interconnection.A wireless mesh network is made up of three or more wireless access points, working in harmony with each other while sharing each other routing protocols, in a collection of cross-connect links to create an interconnected electronic pathway for the transmission between two or more computers. When a wireless mesh is form it creates a single name identifier for access and the signals between wireless access points are used with each other to clearly distinguishable from another network. The organization of sharing access points working in harmony is known as the mesh topology. The defined mesh topology of a given area defined by the access points is known as mesh cloud. Access to this mesh cloud is dependent on the network created by the access points.


Comments ()


Sign in

Read Next

Major achievement

Blog banner

INTERNET SECURITY

Blog banner

Memory management

Blog banner

File management

Blog banner

Direct Memory Access

Blog banner

Love is in air.....

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

USES OF WHATSAPP

Blog banner

MORDERN UNIX SYSTEM

Blog banner

Why Consistency in Eating Habits Matters and How Meal Maharaj Makes It Easy

Blog banner

Why is online marketing is important in current scenario

Blog banner

Modern Operating System - Khush bagaria

Blog banner

Password Generator - Lisp

Blog banner

PROCESS STATES OF OPERATING SYSTEM

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Multiprocessor and Multicore Organization

Blog banner

NIKE

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Place to visit in pune

Blog banner

Improving the Accuracy of GPS and GNSS

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

virtual machine

Blog banner

Animal’s have my heart

Blog banner

GOOGLE

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner

Race Condition in Operating Theatre

Blog banner

Photorec - media recovery tool

Blog banner

Business Intelligence v/s Big Data

Blog banner

Social media

Blog banner

KASHMIR TRIPS

Blog banner

I/O Buffering

Blog banner

Network Forensics

Blog banner

Threads in OS

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

Cache memory

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

Threads

Blog banner

Real time scheduling

Blog banner

Chicken Dum Biryani

Blog banner

Incident management in ITSM

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner