wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Mesh Topology

profile
Anjali Gupta
Aug 29, 2022
0 Likes
0 Discussions
144 Reads

In this layout, every system is connected to every other system. The main advantage of this topology is high availability. The main disadvantage of this topology is cost, both administrative and physical. Because each system is connected to each other, the amount of cabling and maintenance necessary can be prohibitive, especially in larger networks.

This topology is mainly used in Wide Area Network environments or in environments where high availability outweighs the costs associated with this amount of interconnection.A wireless mesh network is made up of three or more wireless access points, working in harmony with each other while sharing each other routing protocols, in a collection of cross-connect links to create an interconnected electronic pathway for the transmission between two or more computers. When a wireless mesh is form it creates a single name identifier for access and the signals between wireless access points are used with each other to clearly distinguishable from another network. The organization of sharing access points working in harmony is known as the mesh topology. The defined mesh topology of a given area defined by the access points is known as mesh cloud. Access to this mesh cloud is dependent on the network created by the access points.


Comments ()


Sign in

Read Next

DNS Cache

Blog banner

Os assignment

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner

Earth with no trees

Blog banner

THE ACTORS LIFE

Blog banner

Service Design Principles

Blog banner

Life

Blog banner

HACKING MOBILE PLATFORM

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

Importance of Morning Routines for Students During the Festive Season

Blog banner

How to use open SSL for web server - browser communication

Blog banner

Platonic Solids

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

EFT

Blog banner

File Systems in OS.

Blog banner

Memory Management

Blog banner

Processes: Process Description and Control.

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

Deadlock and starvation

Blog banner

Lifestyle of a photographer

Blog banner

Never give up

Blog banner

What makes Nugget RC Racing Florida’s Most Exciting Racing Events?

Blog banner

Deadlock in Operating systems

Blog banner

Understanding Endometriosis and Its Psychological Impact on Quality of Life

Blog banner

Jira service Management

Blog banner

Real-time Scheduling - 53003230061

Blog banner

File and File System Structure

Blog banner

John Titor: The Time Traveler

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

How to Find the Right Therapist For Me?

Blog banner

Modern Operating System - Khush bagaria

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

Modern Teaching Methods: Why Inquiry-based & Experiential Learning Works Best

Blog banner

INTERNET SECURITY

Blog banner

Recipe of Paneer Butter Masala

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

Dancing Classes In Mumbai

Blog banner