Made with
ConceptDraw
DIAGRAM 18

Ring Network Topology

Ring Network Topology Diagram

A network topology in which each of the nodes connects to two other nodes, resulting in forming a continuous pathway for the signals through each of the nodes known to be called the “rings”, is known to be called as a “ring network”. Data within such networks is known to be traveling from one node to another node, through all the nodes one by one along its way handling every single packet. The mentioned “rings” can be “unidirectional”, having all its traffic travelling clockwise or anticlockwise all the way around the ring. Also, it can be the so called “bidirectional”, providing only one single pathway between two nodes out of many other nodes. A unidirectional ring network is known to be very likely disrupted by the failure of some link appearing to be nearby.

A node failure as well as any cable break may lead to isolation of every single node, which is attached to the “ring”. Some of the ring networks are known to be adding a so called "counter-rotating ring", also known to be called a “C-Ring”. Adding the mentioned ring can be done for forming a redundant topology. Thus, once break happens, a data may get wrapped back on the ring before it reaches the end of the cable. Such data is known to be maintaining a path to every single node all the way along the resulting counter-rotating ring.

The "dual ring" networks are known to be including the so called “Spatial Reuse Protocol”, as well as the “Fiber Distributed Data Interface”, or “FDDI”, and the “Resilient Packet Ring”. The well-known “IBM token ring networks” are also sometimes called as the “802.5 networks”. They are commonly used for avoiding all the possible and existing weakness of a ring topology by using another topology — a “star” one. Such mentioned topology is usually used at the physical layer for imitating a ring at the so called “data link layer”.

Some of the previously mentioned “SONET/SDH rings” have two sets of the bidirectional links, which can be found between the nodes, allowing the failures or maintenance at the multiple points of the same ring resulting in no loss of the primary traffic on the outer ring in a way of switching the traffic on the inner ring after the so called “failure points”.

One of the advantages of using such network topology can be mentioned the convenience of using it for performing in a better way than a bus topology does, especially in the cases of the need of loading under the so called “heavy network”. The mentioned network topology is known to be used within a very orderly network having every device accessing to the “token” having the opportunity to transmit. Such ring network topologies do not require any central nodes for managing the connectivity between different computers. Because of such point to point line configuration of devices with a device on another side, it is quite simple to install as well as to re-configure whatever is needed by removing or adding any device.

Another special feature of the ring network topologies is its “point to point” line configuration, which makes it much simpler to isolate all the previously identified faults. Also, the reconfiguration for line faults of bidirectional rings in ring network topology can be very fast, having all the switching happening at the highest level, leading to the traffic not requiring any individual re-routing.

The disadvantages of the ring network topology: first of all, it is always more difficult to configure using it to compare to using a “star” one as any node adjunction equals to the ring reconfiguration and shutdown. One of the malfunctioning workstations within the ring network topology can create lots of problems for all the network. This can be solved by using a switch or a dual ring used for closing off the break. Every time there’s some moving, changing and adding the devices can affect the entire ring network and the communication delay is known to be directly proportional to the number of all the existing nodes in the ring network.

It is important to remember that any ring network may afford the so called “fault tolerance” to the telecommunication network having two paths between any two nodes on the network. Ring protection is known to be a system commonly used for assuring any needed communications, continuing in the event of failure of only one path. The most widely used protection architectures are “1+1” as well as “1:1”.

In 1+1 architecture, every single protection path is known to be used for protecting the signal having the bridge at the head of the path on a permanent basis, while the switching occurs at its tail end. There are more than two parallel routes are sent in this architecture traffic and the receiving end is known to be selecting the better of the mentioned two signals. Once some failure occurs, the destination switches into one of the alternative paths. The mentioned architecture is quite a widely used for as it is simple for implementing, resulting quite fast restoration. Although, there’s still a drawback, which is the wastage of the bandwidth, occurring for a reason of no traffic traveling through the redundant path.

Ring Network Topology

Pic. 1. Ring Network Topology

Drawing the ring network topology diagrams taking into consideration any of the mentioned architectures can be always much simpler using a professional software for completing such tasks. One of the best applications nowadays is ConceptDraw DIAGRAM one, enabling all its users to create a great looking diagram, such as a ring network topology one, especially having the Computer and Networks solution downloaded from ConceptDraw STORE application.

Ring Network Topology *

Pic. 2. Ring Network Topology Diagram

Having the ConceptDraw DIAGRAM software means having all the needed tools for making smart looking drawings, at the same time having the ConceptDraw STORE which is meant to be used while working in ConceptDraw DIAGRAM means simplifying your work with creating such diagrams by using the previously developed solutions full of the stencil libraries with the design symbols depending on the subject of your drawing.




See Also Network Topologies:
  • Bus Network Topology
  • Star Network Topology
  • Mesh Network Topology
  • Tree Network Topology
  • Fully Connected Network Topology





    TEN RELATED HOW TO's:
    You need design the Classroom Layout for the school, high-school, university? Now it's incredibly easy to do this in ConceptDraw DIAGRAM software which was supplied with School and Training Plans Solution from the Building Plans Area.Classroom Layout *
    Picture: Classroom Layout
    Related Solution:
    Semiconductors are crystalline or amorphous solids with distinct electrical characteristics. They are of high resistance — higher than typical resistance materials, but still of much lower resistance than insulators. Their resistance decreases as their temperature increases, which is behavior opposite to that of a metal. Finally, their conducting properties may be altered in useful ways by the deliberate, controlled introduction of impurities into the crystal structure, which lowers its resistance but also permits the creation of semiconductor junctions between differently-doped regions of the extrinsic semiconductor crystal. The behavior of charge carriers which include electrons, ions and electron holes at these junctions is the basis of diodes, transistors and all modern electronics. 26 libraries of the Electrical Engineering Solution of ConceptDraw DIAGRAM make your electrical diagramming simple, efficient, and effective. You can simply and quickly drop the ready-to-use objects from libraries into your document to create the electrical diagram.Electrical Symbols — Semiconductor *
    Picture: Electrical Symbols — Semiconductor
    Related Solution:
    Those triangles within any technical analysis are known to be the chart patterns that can be commonly found in the price charts of the financially traded assets, such as stocks, futures, bonds, etc. The pattern is known to be deriving its name from the fact that it is characterized by some contraction in a price range being the converged trend lines, giving it a triangular shape.Pyramid Diagram *
    Picture: Pyramid Diagram
    Related Solution:
    The ConceptDraw vector stencils library Cisco Multimedia, Voice, Phone contains equipment symbols for drawing the computer network diagrams.Cisco Multimedia, Voice, Phone. <br>Cisco icons, shapes, stencils and symbols *
    Picture: Cisco Multimedia, Voice, Phone. Cisco icons, shapes, stencils and symbols
    Related Solution:
    These vector illustrations and cliparts are created for drawing the Project management Illustrations and contain plenty of project management design elements. The clipart library Project management includes 35 icons.Project management - Design Elements *
    Picture: Project management - Design Elements
    Related Solution:
    ConceptDraw DIAGRAM enhanced with Audio, Video, Media solution is a helpful tool for illustration of a CCTV network. It contains library of vector cliparts of video and TV devices and different digital gadgets for drawing such illustrationsBasic CCTV System Diagram. CCTV Network Diagram Example *
    Picture: Basic CCTV System Diagram. CCTV Network Diagram Example
    Related Solutions:
    ConceptDraw DIAGRAM is a drawings software for creating Nature scenes. Nature solution from ConceptDraw Solution Park expands this software with a new library that contains 17 vector objects and samples illustration files.Drawing a Nature Scene *
    Picture: Drawing a Nature Scene
    The following examples cctv network were created in ConceptDraw DIAGRAM diagramming and vector drawing software using the Audio, Video, Media Solution. Using this easily customizable cctv network template you can represent any existing cctv network.CCTV Network Example *
    Picture: CCTV Network Example
    Related Solutions:
    ConceptDraw Business Finance Illustration examples and libraries contain vector clip art for drawing different Business and Finance Illustrations. You may find Advertising example, Project Management example, Business Model example and many more.Business and Finance Illustrations Example *
    Picture: Business and Finance Illustrations Example
    Related Solution:
    The CCTV is the process that carried out using the video cameras for transmitting the signal to the specific location, on the limited set of monitors. We are talking about the video cameras that are used for monitoring on such guarded objects as airports, banks, stores, military objects, etc. CCTV equipment is also used in the industrial installations, for surveillance in the public places, for recording the video on the digital video recorders.CCTV Network Diagram Software *
    Picture: CCTV Network Diagram Software
    Related Solutions:
    ConceptDraw
    DIAGRAM 18