wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Mesh Topology

profile
Anjali Gupta
Aug 29, 2022
0 Likes
0 Discussions
143 Reads

In this layout, every system is connected to every other system. The main advantage of this topology is high availability. The main disadvantage of this topology is cost, both administrative and physical. Because each system is connected to each other, the amount of cabling and maintenance necessary can be prohibitive, especially in larger networks.

This topology is mainly used in Wide Area Network environments or in environments where high availability outweighs the costs associated with this amount of interconnection.A wireless mesh network is made up of three or more wireless access points, working in harmony with each other while sharing each other routing protocols, in a collection of cross-connect links to create an interconnected electronic pathway for the transmission between two or more computers. When a wireless mesh is form it creates a single name identifier for access and the signals between wireless access points are used with each other to clearly distinguishable from another network. The organization of sharing access points working in harmony is known as the mesh topology. The defined mesh topology of a given area defined by the access points is known as mesh cloud. Access to this mesh cloud is dependent on the network created by the access points.


Comments ()


Sign in

Read Next

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

How International Schools Build Global-Minded Students through Curriculum & Activities

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

MOBILE DEVICE FORENSIC

Blog banner

Perfect Moments to Wear a Rich Patola Design Outfit

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

objectives and functions of operating system

Blog banner

Importance of Website

Blog banner

SQL Injection practice on DVWA

Blog banner

Elegant fashion style

Blog banner

MailChimp

Blog banner

Study of Backdoor and Trojan tools

Blog banner

What's Better : Supervised or Unsupervised Learning

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

Blog on health and fitness

Blog banner

Deadlock and starvation

Blog banner

Indian Food

Blog banner

Emotional Intelligence in Children: Why It Is as Important as Academics

Blog banner

Deadlock

Blog banner

Cryptanalysis tool

Blog banner

Pooja Silver

Blog banner

Deadlocks

Blog banner

Traditional Unix System

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

Starvation

Blog banner

Theads

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

 " Healing of Yoga "

Blog banner

Jira service Management

Blog banner

Cache Memory

Blog banner

The Evolution of Operating Systems

Blog banner

Importance of Morning Routines for Students During the Festive Season

Blog banner

'Positivity in life'

Blog banner

All you need to know about “On-page SEO”

Blog banner

PODIO

Blog banner

Virtual memory in windows

Blog banner

Why Does Hierarchy Still matter in Organizations?

Blog banner

Virtual memory

Blog banner

Deadlock Prevention

Blog banner