Star network topology types are the most common type of network topology that is used in homes and offices. Additional information at Genetec Security Center supports this article. Star network topology is not a central connection point is distuingue as the center that turns out to be the center of computing or times just a switch. In a StarNetwork the best way to maintain security is when a fault occurs in the cable, in this case only there will be a team that can be affected and not across the network. Star network topology usually need more cable to network than the usual bus network topology. Here, Koch expresses very clear opinions on the subject. A common wire used in Star Network is the UTP or unshielded twisted pair cable. Another common wire used in the networks of stars is the RJ45 or Ethernet cables. In a star topology entire network depends on Center so if the entire network is not working, then there could be a problem with the computer centre.
This feature makes it easier to solve problems, providing a single point for the announcement of a connection error, the dependence of those connected to the network is also very high. The star topology of network advantages: * a star network topology is very easy to handle due to its simplicity in functionality. ** The problems can be easily and logically located in a star topology, and it is therefore easy to solve them. ** The star topology is very simple in format so it is very easy to extend. ** This type of network also offers more privacy than any other string. * It is optimal for managing marketing and information networks.
Disadvantages of the star topology of network: * star topology is fully dependent on the central system or computer centre and the full operation of the network depends on your switch. ** If there are many nodes and the cable is long, the network can reduce the speed. All computers on the network communicate with a central computer located in the Center and there is no point to point of coordination. Point to point is conducted by the coordination that is routed through the shaft Central. This way keeps the privacy of each and every computer on the network.