wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Mesh Topology

profile
Anjali Gupta
Aug 29, 2022
0 Likes
0 Discussions
143 Reads

In this layout, every system is connected to every other system. The main advantage of this topology is high availability. The main disadvantage of this topology is cost, both administrative and physical. Because each system is connected to each other, the amount of cabling and maintenance necessary can be prohibitive, especially in larger networks.

This topology is mainly used in Wide Area Network environments or in environments where high availability outweighs the costs associated with this amount of interconnection.A wireless mesh network is made up of three or more wireless access points, working in harmony with each other while sharing each other routing protocols, in a collection of cross-connect links to create an interconnected electronic pathway for the transmission between two or more computers. When a wireless mesh is form it creates a single name identifier for access and the signals between wireless access points are used with each other to clearly distinguishable from another network. The organization of sharing access points working in harmony is known as the mesh topology. The defined mesh topology of a given area defined by the access points is known as mesh cloud. Access to this mesh cloud is dependent on the network created by the access points.


Comments ()


Sign in

Read Next

Can ChatGPT Answer All My Questions About Life?

Blog banner

Concept and definition of m-commerce

Blog banner

Computer Security

Blog banner

Child labour

Blog banner

GIS info about Bermuda Triangle

Blog banner

The Rich Heritage Of Patola Sarees: Gujarat’s Timeless Weaving Art

Blog banner

LIFEHACKER

Blog banner

Elegant fashion style

Blog banner

Travel Geek ‘The last $50k in Switzerland’

Blog banner

Whatsapp Messenger

Blog banner

Process in OS

Blog banner

Understanding - Proof of Work!

Blog banner

TRIGGERS IN DATABASE

Blog banner

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

BrainGate Technology

Blog banner

Threads

Blog banner

When Is the Right Time to Enrol My Toddler Into Preschool? NEP

Blog banner

What's Better : Supervised or Unsupervised Learning

Blog banner

Memory Partitioning

Blog banner

Memory Management - operating system

Blog banner

Save Environment

Blog banner

Comprehensive Bitcoin Mining - Aarti Dabholkar

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Raid

Blog banner

Basic Security For SOAP Services

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

Service Operations Principles

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

Importance of Website

Blog banner

Operating system

Blog banner

IT RISK

Blog banner

City of Mumbai (Bombay):

Blog banner

Proof-of-Stake (PoS)

Blog banner

Design in figma

What is Internet

Blog banner

Data Mining

Blog banner

10 Unknown facts about India's Independence

Blog banner

Mango Raisin Chutney (sweet mango raisin spread)

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner