Category: Network topology

Spanning Tree Protocol
The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for Ethernet networks. The basic function of STP is to prevent bridge loops and the broadcast radiation
Grid network
A grid network is a computer network consisting of a number of computer systems connected in a grid topology. In a regular grid topology, each node in the network is connected with two neighbors along
Fibonacci cube
In the mathematical field of graph theory, the Fibonacci cubes or Fibonacci networks are a family of undirected graphs with rich recursive properties derived from its origin in number theory. Mathemat
Switching loop
A switching loop or bridge loop occurs in computer networks when there is more than one layer 2 path between two endpoints (e.g. multiple connections between two network switches or two ports on the s
Cloud-Native Network Function
A Cloud-Native Network Function (CNF) is a software-implementation of a function, or application, traditionally performed on a physical device, but which runs inside Linux containers (typically orches
Sparse network
In network science, a sparse network has much fewer links than the possible maximum number of links within that network (the opposite is a dense network). The study of sparse networks is a relatively
Mesh networking
A mesh network is a local area network topology in which the infrastructure nodes (i.e. bridges, switches, and other infrastructure devices) connect directly, dynamically and non-hierarchically to as
Broadcast, unknown-unicast and multicast traffic
Broadcast, unknown-unicast and multicast traffic (BUM traffic) is network traffic transmitted using one of three methods of sending data link layer network traffic to a destination of which the sender
Ring protection
In a telecommunication network, a ring network affords fault tolerance to the network because there are two paths between any two nodes on the network. Ring protection is the system used to assure com
Szymanski's conjecture
In mathematics, Szymanski's conjecture, named after Ted H. Szymanski, states that every permutation on the n-dimensional doubly directed hypercube graph can be routed with edge-disjoint paths. That is
Topology of the World Wide Web
World Wide Web topology is the network topology of the World Wide Web, as seen as a network of web pages connected by hyperlinks. The Jellyfish and Bow Tie models are two attempts at modeling the topo
Topology control
Topology control is a technique used in distributed computing to alter the underlying network (modeled as a graph) to reduce the cost of distributed algorithms if run over the resulting graphs. It is
Connection-oriented Ethernet
Connection-oriented Ethernet refers to the transformation of Ethernet, a connectionless communication system by design, into a connection-oriented system. The aim of connection-oriented Ethernet is to
Cube-connected cycles
In graph theory, the cube-connected cycles is an undirected cubic graph, formed by replacing each vertex of a hypercube graph by a cycle. It was introduced by for use as a network topology in parallel
Network topology
Network topology is the arrangement of the elements (links, nodes, etc.) of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunic
Shared Risk Resource Group
Shared risk resource group (commonly referred to as shared risk group or SRG) is a concept in optical mesh network routing that different networks may suffer from a common failure if they share a comm
Bus network
A bus network is a network topology in which nodes are directly connected to a common half-duplex link called a bus. A host on a bus network is called a station. In a bus network, every station will r
Switched fabric
Switched fabric or switching fabric is a network topology in which network nodes interconnect via one or more network switches (particularly crossbar switches). Because a switched fabric network sprea
Switched mesh
A switched mesh is a wireless mesh network that uses multiple radios to communicate via dedicated mesh backhaul links to each neighboring node in the mesh. Here all of the available bandwidth of each
Token Ring
Token Ring is a computer networking technology used to build local area networks. It was introduced by IBM in 1984, and standardized in 1989 as IEEE 802.5. It uses a special three-byte frame called a
Hypercube internetwork topology
In computer networking, hypercube networks are a type of network topology used to connect multiple processors with memory modules and accurately route data. Hypercube networks consist of 2m nodes, whi
Topology table
A topology table is used by routers that route traffic in a network. It consists of all routing tables inside the Autonomous System where the router is positioned. Each router using the routing protoc
Tree and hypertree networks
No description available.
Virtual Cluster Switching
Virtual Cluster Switching (VCS) fabric technology is a Layer 2 proprietary Ethernet technology from Brocade Communications Systems, later acquired by Extreme Networks. It is designed to improve networ
Star network
A star network is an implementation of a spoke–hub distribution paradigm in computer networks. In a star network, every host is connected to a central hub. In its simplest form, one central hub acts a
QFabric is a proprietary technology proposed by Juniper Networks. In contrary to open standards such as OpenFlow, QFabric is regarded as a vendor proprietary approach. Its goal is to simplify the trad
Multi-link trunking
Multi-link trunking (MLT) is a link aggregation technology developed at Nortel in 1999. It allows grouping several physical Ethernet links into one logical Ethernet link to provide fault-tolerance and
Clos network
In the field of telecommunications, a Clos network is a kind of multistage circuit-switching network which represents a theoretical idealization of practical, multistage switching systems. It was inve
Layered system
In telecommunication, a layered system is a system in which components are grouped, i.e., layered, in a hierarchical arrangement, such that lower layers provide functions and services that support the
Ethernet train backbone
An Ethernet train backbone (ETB) is a train communication network based on Ethernet technology standardised with IEC-61375-2-5. This is a train-wide communication backbone such as Wire Train Bus (WTB)
Peer-to-peer direct and anonymous distribution overlay (P2PRIV) was a conceptual anonymous peer-to-peer overlay network introduced at Warsaw University of Technology in 2007. P2PRIV hides an initiator
Feeder line (network)
A feeder line is a peripheral route or branch in a network, which connects smaller or more remote nodes with a route or branch carrying heavier traffic. The term is applicable to any system based on a
Point-to-multipoint communication
In telecommunications, point-to-multipoint communication (P2MP, PTMP or PMP) is communication which is accomplished via a distinct type of one-to-many connection, providing multiple paths from a singl
Virtual Link Aggregation Control Protocol
Virtual LACP (VLACP) is an Avaya extension of the Link Aggregation Control Protocol to provide a Layer 2 handshaking protocol which can detect end-to-end failure between two physical Ethernet interfac
Ethernet consist network
Ethernet Consist Network (ECN) is a train communication network based on Ethernet technology standardised with IEC-61375-3-. This is a vehicle (consist) communication like Multifunction Vehicle Bus (M
Cambridge Ring (computer network)
The Cambridge Ring was an experimental local area network architecture developed at the Computer Laboratory, University of Cambridge starting in 1974 and continuing into the 1980s. It was a ring netwo
Butterfly network
A butterfly network is a technique to link multiple computers into a high-speed network. This form of multistage interconnection network topology can be used to connect different nodes in a multiproce
Broadcast storm
A broadcast storm or broadcast radiation is the accumulation of broadcast and multicast traffic on a computer network. Extreme amounts of broadcast traffic constitute a "broadcast storm". It can consu
Metro Ethernet
A metropolitan-area Ethernet, Ethernet MAN, or metro Ethernet network is a metropolitan area network (MAN) that is based on Ethernet standards. It is commonly used to connect subscribers to a larger s
Shared mesh
A shared mesh (also known as 'traditional' or 'best effort' mesh) is a wireless mesh network that uses a single radio to communicate via mesh backhaul links to all the neighboring nodes in the mesh. T
Arbitrated loop
The arbitrated loop, also known as FC-AL, is a Fibre Channel topology in which devices are connected in a one-way loop fashion in a ring topology. Historically it was a lower-cost alternative to a fab
Tree toplology
No description available.
Hyperconnectivity is a term invented by Canadian social scientists Anabel Quan-Haase and Barry Wellman, arising from their studies of person-to-person and person-to-machine communication in networked
Point-to-point (telecommunications)
In telecommunications, a point-to-point connection refers to a communications connection between two communication endpoints or nodes. An example is a telephone call, in which one telephone is connect
Multiple Spanning Tree Protocol
The Multiple Spanning Tree Protocol (MSTP) and algorithm, provides both simple and full connectivity assigned to any given Virtual LAN (VLAN) throughout a Bridged Local Area Network. MSTP uses BPDUs t
Shuffle-exchange network
In graph theory, the shuffle-exchange network is an undirected cubic multigraph, whose vertices represent binary sequences of a given length and whose edges represent two operations on these sequence,
Fat tree
The fat tree network is a universal network for provably efficient communication. It was invented by Charles E. Leiserson of the Massachusetts Institute of Technology in 1985. k-ary n-trees, the type
Hypertree network
A hypertree network is a network topology that shares some traits with the binary tree network. It is a variation of the fat tree architecture. A hypertree of degree k depth d may be visualized as a 3
Broadcasting (networking)
In computer networking, telecommunication and information theory, broadcasting is a method of transferring a message to all recipients simultaneously. Broadcasting can be performed as a high-level ope
Ethernet Exchange
Ethernet exchange is a physical network infrastructure through which Ethernet service providers, carriers and Internet service providers exchange Ethernet traffic between their networks. The Ethernet
Tree network
A tree topology, or star-bus topology, is a hybrid network topology in which star networks are interconnected via bus networks. Tree networks are hierarchical, and each node can have an arbitrary numb
Evolution of a random network
Evolution of a random network is a dynamical process, usually leading to emergence of giant component accompanied with striking consequences on the network topology. To quantify this process, there is
InterSwitch Trunk
InterSwitch Trunk (IST) is one or more parallel point-to-point links (Link aggregation) that connect two switches together to create a single logical switch. The IST allows the two switches to share a
Virtual Link Trunking
Virtual Link Trunking (VLT) is a name that has been used for at least two proprietary network protocols. A link aggregation protocol developed by Force10 and an early VLAN tagging capability from 3Com
Ring network
A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node – a ring. Data travels from node to node,