Flower topology

The Flower Topology network model was used in the early 1990s during testing for the NetMax Studios network. Throughout this time, the network model was used primarily as a testing environment; deploying various packages containing data sets. These data sets were used as a coded method of encrypting different information between small networks. The pulses of information used to send these "packets" were referred to as "roots".
Computers joined to the "bud" are referred to as "petals", the petals receive their information from the "pot", a separately wired networked master computer.
Later versions made in 1998 used wireless networks which enabled wireless devices nicknamed "bees" to connect to the flower. Bees were used to send the previous packet without the need of wires.
The "Queen Bee" was used as a data mine by the smaller bees to gather the information required to access the flower network.
Use of Topology
The topology was never released to the general public however NetMax Studios shared the information between a select few smaller companies.
Advantages
*If one of the "petal" computers disconnects or fails, another will re-grow through the power of the internet
*The bee is the only computer to collect the data
*You can have many petals
*Flower topology is powered by the sun
Disadvantages
*It requires "watering", maintenance
*The Queen Bee is vulnerable to attacks
Other topologies
*Star network
*Bus network
*Mesh network
*Tree network
*Hypertree network
 
< Prev   Next >