wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Mesh Topology

profile
Anjali Gupta
Aug 29, 2022
0 Likes
0 Discussions
144 Reads

In this layout, every system is connected to every other system. The main advantage of this topology is high availability. The main disadvantage of this topology is cost, both administrative and physical. Because each system is connected to each other, the amount of cabling and maintenance necessary can be prohibitive, especially in larger networks.

This topology is mainly used in Wide Area Network environments or in environments where high availability outweighs the costs associated with this amount of interconnection.A wireless mesh network is made up of three or more wireless access points, working in harmony with each other while sharing each other routing protocols, in a collection of cross-connect links to create an interconnected electronic pathway for the transmission between two or more computers. When a wireless mesh is form it creates a single name identifier for access and the signals between wireless access points are used with each other to clearly distinguishable from another network. The organization of sharing access points working in harmony is known as the mesh topology. The defined mesh topology of a given area defined by the access points is known as mesh cloud. Access to this mesh cloud is dependent on the network created by the access points.


Comments ()


Sign in

Read Next

Caching windows

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

Traditional UNIX Scheduling

Blog banner

Full Disk Encryption

Blog banner

Types of Viruses

Blog banner

Bit Coins

Blog banner

Importance Of Blockchain

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

AI and Data Science: Revolutionizing Industries

Blog banner

memory cache

Blog banner

Exploring Florida Beyond the Obvious Tourist Trails

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

Rain bow

Blog banner

VIRTUAL MEMORY

Blog banner

Thumb Sucking: When It’s Normal and When It Becomes a Dental Problem

Blog banner

LinkedIn: Watch out for these 7 upcoming updates in 2023

Blog banner

CRISP-DM Methodology

Blog banner

Understanding the 4 Types of Learning Methods in Early Childhood

Blog banner

Socket Programming in Java

Blog banner

Can a Water Flosser Replace Manual Flossing? Here’s What Dentists Say

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Depression

Blog banner

Cyber Forensic in the Banking sector

Blog banner

Process State

Blog banner

Security requirements for Safe E-Payments

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

Meshoo

Blog banner

Data Warehousing

Blog banner

GOOGLE

Blog banner

ODOO

Blog banner

Evolution of Operating Systems

Blog banner

How I use google in my daily life

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

FASHION

Blog banner

Scala - a programming tool

Blog banner

Threat management

Blog banner

What is Internet

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Power of words

Blog banner