wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Mesh Topology

profile
Anjali Gupta
Aug 29, 2022
0 Likes
0 Discussions
143 Reads

In this layout, every system is connected to every other system. The main advantage of this topology is high availability. The main disadvantage of this topology is cost, both administrative and physical. Because each system is connected to each other, the amount of cabling and maintenance necessary can be prohibitive, especially in larger networks.

This topology is mainly used in Wide Area Network environments or in environments where high availability outweighs the costs associated with this amount of interconnection.A wireless mesh network is made up of three or more wireless access points, working in harmony with each other while sharing each other routing protocols, in a collection of cross-connect links to create an interconnected electronic pathway for the transmission between two or more computers. When a wireless mesh is form it creates a single name identifier for access and the signals between wireless access points are used with each other to clearly distinguishable from another network. The organization of sharing access points working in harmony is known as the mesh topology. The defined mesh topology of a given area defined by the access points is known as mesh cloud. Access to this mesh cloud is dependent on the network created by the access points.


Comments ()


Sign in

Read Next

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner

Deadlock and Starvation

Blog banner

Junk food vs healthy food

Blog banner

Development Of Modern Operating System

Blog banner

semaphores

Blog banner

What is OS and its overview

Blog banner

Memory Hierarchy

Blog banner

A small world of Sockets

Blog banner

Deadlock and Starvation

Blog banner

Different types of scam Fraud

Blog banner

Memory Management in Operating System

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

OPERATING SYSTEM

Blog banner

OPERATING SYSTEM

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

E-BUSINESS RISK MANAGEMENT

Blog banner

Social Media Sentiment Analysis

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

MUTUAL EXCLUSION

Blog banner

Beautiful and stunning natural phenomena worth to see

Blog banner

Importance of Website

Blog banner

Memory hierarchy

Blog banner

The functions of operating system

Blog banner

How Cyber Forensics use in AI

Blog banner

Memory management

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

Consumer to consumer business mode

Blog banner

Process Creation

Blog banner

Synchronization

Blog banner

Processes: Process Description and Control.

Blog banner

What are the different types of E-mail crime and process of email forensic?

Blog banner

Virtual memory

Blog banner

Smartsheet

Blog banner

Deadlock and starvation

Blog banner

Points to consider if you're planning to visit Florida in 2026

Blog banner

Introduction to Solidity Programming for Blockchain Development

Blog banner

"Games and the future"

Blog banner

10 Amazing facts about Tokyo Ghoul

Blog banner

Types of Hackers.

Blog banner

Fitness

Blog banner

Starting Android Activity Using Intent

Blog banner