SlideShare a Scribd company logo
There are mainly 5 types of
         topologies:
 Star
 Bus
 Ring
 Tree
 Mesh
Star
In a star network devices are connected to a
   central computer, called a hub. Nodes
   communicate across the network by passing
   data through the hub.

Advantage: In a star network, one malfunctioning
  node does not affect the rest of the network.
Disadvantage: If the central computer fails, the
  entire network becomes unusable.
Bus
In networking a bus is the central cable that connects all
 devices on a local-area network (LAN). It is also called
 the backbone.
Advantage: It’s relatively cheaper, easy to connect a
computer or device and requires less cable than a star
topology.
Disadvantage: The entire network shuts down if there is
a break in the main wire and it can be difficult to identify
the problem if the network shuts down.
Ring
In this topology, all of the nodes are connected
 in a closed loop. Messages travel around the
 ring, with each node reading those messages
 addressed to it.
Advantage: It can span larger distances than
 other types of networks, such as bus
 networks, because each node regenerates
 messages as they pass through it.
Tree
This is a "hybrid" topology that combines characteristics
 of linear bus and star topologies. In a tree network,
 groups of star-configured networks are connected to a
 linear bus backbone cable.

Advantage: A Tree topology is a good choice for large
 computer networks as the tree topology "divides" the
 whole network into parts that are more easily
 manageable.

Disadvantage: The entire network depends on a central
 hub and a failure of the central hub can cripple the
 whole network.
Mesh
In a mesh network, devices are connected with many unnecessary
 interconnections between network nodes.
There are two types of mesh topologies:


Full mesh topology occurs when every node has a circuit connecting it to
 every other node in a network. Full mesh is very expensive to implement but
 yields the greatest amount of uselessness. So if one of those nodes
 fails, network traffic can be directed to any of the other nodes. Full mesh is
 usually reserved for backbone networks.


Partial mesh topology is less expensive to implement and yields less
 redundancy than full mesh topology. With partial mesh, some nodes are
 organized in a full mesh scheme but others are only connected to one or two
 in the network. Partial mesh topology is commonly found in peripheral
 networks connected to a full meshed backbone.
Topologies

More Related Content

What's hot

Topology
TopologyTopology
Topology
Maths
 
Network Topology and its types
Network Topology and its typesNetwork Topology and its types
Network Topology and its types
Madhuri Badgujar
 
Topology presentation-sachin noire
Topology presentation-sachin noireTopology presentation-sachin noire
Topology presentation-sachin noire
sachin kumar
 
Network Topology
Network TopologyNetwork Topology
Network Topology
Norhisham Mohamad Nordin
 
Network topology
Network topologyNetwork topology
Network topology
Hardik Patel
 
Bus topology ppt
Bus topology pptBus topology ppt
Bus topology ppt
Ananthkumar6965
 
Presentation on network topology
Presentation on network topologyPresentation on network topology
Presentation on network topology
Swarnima Tiwari
 
Network topologies
Network topologiesNetwork topologies
Network topologieszirram
 
Network Topology
Network TopologyNetwork Topology
Network Topology
Pharica Bailey
 
Topology
TopologyTopology
Computer Network topology
Computer Network topologyComputer Network topology
Computer Network topology
Muhammad Bilal
 
Day 1.2 physical topologies
Day 1.2 physical topologiesDay 1.2 physical topologies
Day 1.2 physical topologies
CYBERINTELLIGENTS
 
Hwn network s2
Hwn network s2Hwn network s2
Hwn network s2Ram Pukar
 
Topology
TopologyTopology
Network Topology
Network TopologyNetwork Topology
Network Topology
Malik Mehrose
 
Network Topology
Network TopologyNetwork Topology
Network Topology
Swapna Subhadarsini
 
TREE TOPOLOGY
TREE TOPOLOGY TREE TOPOLOGY
TREE TOPOLOGY
Nets international LLC
 
network topology
network topologynetwork topology
network topology
harish pillai
 
Network Topology
Network TopologyNetwork Topology
Network Topology
JAI MCA-STUDENT
 

What's hot (20)

Network Topology
Network TopologyNetwork Topology
Network Topology
 
Topology
TopologyTopology
Topology
 
Network Topology and its types
Network Topology and its typesNetwork Topology and its types
Network Topology and its types
 
Topology presentation-sachin noire
Topology presentation-sachin noireTopology presentation-sachin noire
Topology presentation-sachin noire
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Network topology
Network topologyNetwork topology
Network topology
 
Bus topology ppt
Bus topology pptBus topology ppt
Bus topology ppt
 
Presentation on network topology
Presentation on network topologyPresentation on network topology
Presentation on network topology
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Topology
TopologyTopology
Topology
 
Computer Network topology
Computer Network topologyComputer Network topology
Computer Network topology
 
Day 1.2 physical topologies
Day 1.2 physical topologiesDay 1.2 physical topologies
Day 1.2 physical topologies
 
Hwn network s2
Hwn network s2Hwn network s2
Hwn network s2
 
Topology
TopologyTopology
Topology
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
TREE TOPOLOGY
TREE TOPOLOGY TREE TOPOLOGY
TREE TOPOLOGY
 
network topology
network topologynetwork topology
network topology
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 

Viewers also liked

3DIR: Exploiting Topological Relationships in Three-dimensional Information R...
3DIR: Exploiting Topological Relationships in Three-dimensional Information R...3DIR: Exploiting Topological Relationships in Three-dimensional Information R...
3DIR: Exploiting Topological Relationships in Three-dimensional Information R...
pdemian
 
Mcitp lec 5
Mcitp lec 5Mcitp lec 5
Mcitp lec 5
Ahmad Ramin Azizi
 
Network topologies
Network topologiesNetwork topologies
Network topologies
Shripal Oswal
 
Network topology
Network topologyNetwork topology
Network topology
lekshmik
 
Topology presentation
Topology  presentationTopology  presentation
Topology presentationJobaida Nahar
 
Network topologies
Network topologiesNetwork topologies
Network topologies
Norah Saad
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
Siddique Ibrahim
 

Viewers also liked (11)

Topologi jaringan
Topologi jaringanTopologi jaringan
Topologi jaringan
 
3DIR: Exploiting Topological Relationships in Three-dimensional Information R...
3DIR: Exploiting Topological Relationships in Three-dimensional Information R...3DIR: Exploiting Topological Relationships in Three-dimensional Information R...
3DIR: Exploiting Topological Relationships in Three-dimensional Information R...
 
Mcitp lec 5
Mcitp lec 5Mcitp lec 5
Mcitp lec 5
 
Hardware3
Hardware3Hardware3
Hardware3
 
Network topology
Network topologyNetwork topology
Network topology
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network topology
Network topologyNetwork topology
Network topology
 
Topology presentation
Topology  presentationTopology  presentation
Topology presentation
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 

Similar to Topologies

Topology
TopologyTopology
Topology
Burhan Ahmed
 
Network Topology's
Network Topology'sNetwork Topology's
Network Topology's
Raja Adapa
 
Distributed Structure System
Distributed Structure SystemDistributed Structure System
Distributed Structure System
husnaina_akhtar
 
Topology of the Network class 8 .ppt pdf
Topology of the Network class 8 .ppt pdfTopology of the Network class 8 .ppt pdf
Topology of the Network class 8 .ppt pdf
AnushkaTripathi61
 
topology.pptx
topology.pptxtopology.pptx
topology.pptx
YashKoli22
 
Network Topology
Network TopologyNetwork Topology
Network Topology
Md Saylab
 
Network topology
Network topologyNetwork topology
Network topology
maandomingo8
 
Types of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterTypes of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouter
AlidHasan4
 
Network -Lecture Notes
Network -Lecture NotesNetwork -Lecture Notes
Network -Lecture Notes
Bathshebaparimala
 
Network Topology And Its Types
Network Topology And Its TypesNetwork Topology And Its Types
Network Topology And Its Types
SaadSaif6
 
Network topology
Network topologyNetwork topology
Network topology
Nafizul Islam
 
Network Topology
Network TopologyNetwork Topology
Network Topology
Rohan Raj
 
Network topology
Network topologyNetwork topology
Network topology
ArjonDando1
 
Networkingtopology 131208065823-phpapp02
Networkingtopology 131208065823-phpapp02Networkingtopology 131208065823-phpapp02
Networkingtopology 131208065823-phpapp02imtiaz hussain
 
Network Topologies in computer networking
Network Topologies in computer networkingNetwork Topologies in computer networking
Network Topologies in computer networking
nazmulabdal
 
Different types of Topology
Different types of TopologyDifferent types of Topology
Different types of Topology
Md Parvez Hossain_1925102524
 
Network Topology
Network TopologyNetwork Topology
Network Topology
AfsanaAkterRubi
 

Similar to Topologies (20)

Topology
TopologyTopology
Topology
 
Network Topology's
Network Topology'sNetwork Topology's
Network Topology's
 
Distributed Structure System
Distributed Structure SystemDistributed Structure System
Distributed Structure System
 
Topology of the Network class 8 .ppt pdf
Topology of the Network class 8 .ppt pdfTopology of the Network class 8 .ppt pdf
Topology of the Network class 8 .ppt pdf
 
topology.pptx
topology.pptxtopology.pptx
topology.pptx
 
report.pptx
report.pptxreport.pptx
report.pptx
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Network topology
Network topologyNetwork topology
Network topology
 
Types of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterTypes of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouter
 
Network -Lecture Notes
Network -Lecture NotesNetwork -Lecture Notes
Network -Lecture Notes
 
Networking topology
Networking topologyNetworking topology
Networking topology
 
Network Topology And Its Types
Network Topology And Its TypesNetwork Topology And Its Types
Network Topology And Its Types
 
Network topology
Network topologyNetwork topology
Network topology
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Network topology
Network topologyNetwork topology
Network topology
 
Networkingtopology 131208065823-phpapp02
Networkingtopology 131208065823-phpapp02Networkingtopology 131208065823-phpapp02
Networkingtopology 131208065823-phpapp02
 
Network Topologies in computer networking
Network Topologies in computer networkingNetwork Topologies in computer networking
Network Topologies in computer networking
 
Different types of Topology
Different types of TopologyDifferent types of Topology
Different types of Topology
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 

Recently uploaded

Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

Topologies

  • 1. There are mainly 5 types of topologies:  Star  Bus  Ring  Tree  Mesh
  • 2. Star In a star network devices are connected to a central computer, called a hub. Nodes communicate across the network by passing data through the hub. Advantage: In a star network, one malfunctioning node does not affect the rest of the network. Disadvantage: If the central computer fails, the entire network becomes unusable.
  • 3.
  • 4. Bus In networking a bus is the central cable that connects all devices on a local-area network (LAN). It is also called the backbone. Advantage: It’s relatively cheaper, easy to connect a computer or device and requires less cable than a star topology. Disadvantage: The entire network shuts down if there is a break in the main wire and it can be difficult to identify the problem if the network shuts down.
  • 5.
  • 6. Ring In this topology, all of the nodes are connected in a closed loop. Messages travel around the ring, with each node reading those messages addressed to it. Advantage: It can span larger distances than other types of networks, such as bus networks, because each node regenerates messages as they pass through it.
  • 7.
  • 8. Tree This is a "hybrid" topology that combines characteristics of linear bus and star topologies. In a tree network, groups of star-configured networks are connected to a linear bus backbone cable. Advantage: A Tree topology is a good choice for large computer networks as the tree topology "divides" the whole network into parts that are more easily manageable. Disadvantage: The entire network depends on a central hub and a failure of the central hub can cripple the whole network.
  • 9.
  • 10. Mesh In a mesh network, devices are connected with many unnecessary interconnections between network nodes. There are two types of mesh topologies: Full mesh topology occurs when every node has a circuit connecting it to every other node in a network. Full mesh is very expensive to implement but yields the greatest amount of uselessness. So if one of those nodes fails, network traffic can be directed to any of the other nodes. Full mesh is usually reserved for backbone networks. Partial mesh topology is less expensive to implement and yields less redundancy than full mesh topology. With partial mesh, some nodes are organized in a full mesh scheme but others are only connected to one or two in the network. Partial mesh topology is commonly found in peripheral networks connected to a full meshed backbone.