SlideShare una empresa de Scribd logo
1 de 28
Line Configuration
•
•
•
1.
2.
•

Line configuration refers to the way two or more
communication devices attach to a link.
A link is the physical communication pathway that
transfers data from one device to another.
There are two line configurations:
Point-to-Point
Multipoint
A point-to-point line configuration provides a dedicated
link between two devices. The entire capacity of the
channel is reserved for transmission between those two
devices.
Point-point connection
• A multipoint line configuration is one in which more than
two specific devices share a single link. In a multipoint
environment, the capacity of the channel is shared, either
spatially or temporally.
• If several devices can use the link simultaneously, it is a
spatially shared line configuration.
• If users must take turns, it is a time-shared line
configuration.
Multipoint line configuration
Network topology
• A topology is a way of “laying out” the
network. Topologies can be either physical or
logical.
• Physical topologies describe how the cables
are run.
• Logical topologies describe how the network
messages travel
Network topology (cont.)
•
•
•
•

Bus (can be both logical and physical)
Star (physical only)
Ring (can be both logical and physical)
Mesh (can be both logical and physical)
Network topology (cont.)
Bus
• A bus is the simplest physical topology. It consists of a single
cable that runs to every workstation
• This topology uses the least amount of cabling, but also
covers the shortest amount of distance.
• Each computer shares the same data and address path. With
a logical bus topology, messages pass through the trunk, and
each workstation checks to see if the message is addressed to
itself. If the address of the message matches the
workstation’s address, the network adapter copies the
message to the card’s on-board memory.
Network topology (cont.)
• it is difficult to add a workstation
• have to completely reroute the cable and
possibly run two additional lengths of it.
• if any one of the cables breaks, the entire
network is disrupted. Therefore, it is very
expensive to maintain.
Network topology (cont.)
• Bus topology
Network topology (cont.)
Star Topology
• A physical star topology branches each network device off a
central device called a hub, making it very easy to add a new
workstation.
• Also, if any workstation goes down it does not affect the
entire network. (But, as you might expect, if the central
device goes down, the entire network goes down.)
• Some types of Ethernet and ARCNet use a physical star
topology.
Network topology (cont.)
• Star topologies are easy to install. A cable is
run from each workstation to the hub. The
hub is placed in a central location in the office.
• Star topologies are more expensive to install
than bus networks, because there are several
more cables that need to be installed, plus the
cost of the hubs that are needed.
Network topology (cont.)
• Star Topology
Network topology (cont.)
Ring
• Each computer connects to two other computers,
joining them in a circle creating a unidirectional path
where messages move workstation to workstation.
• Each entity participating in the ring reads a message,
then regenerates it and hands it to its neighbor on a
different network cable.
Network topology (cont.)
• The ring makes it difficult to add new
computers.
• Unlike a star topology network, the ring
topology network will go down if one entity is
removed from the ring.
• Physical ring topology systems don’t exist
much anymore, mainly because the hardware
involved was fairly expensive and the fault
tolerance was very low.
Network topology (cont.)
• Ring Topology
Network topology (cont.)
Mesh
• The mesh topology is the simplest logical topology in terms of
data flow, but it is the most complex in terms of physical
design.
• In this physical topology, each device is connected to every
other device.
• This topology is rarely found in LANs, mainly because of the
complexity of the cabling.
Network topology (cont.)
• Because of its design, the physical mesh topology is very expensive to
install and maintain.
• Cables must be run from each device to every other device. The
advantage you gain from it is its high fault tolerance.
• With a logical mesh topology, however, there will always be a way of
getting the data from source to destination.
• It may not be able to take the direct route, but it can take an alternate,
indirect route. It is for this reason that the mesh topology is still found
in WANs to connect multiple sites across WAN links. It uses devices
called routers to search multiple routes through the mesh and
determine the best path.
• However, the mesh topology does become inefficient with five or more
entities.
Network topology (cont.)
• Mesh Topology
Network topology (cont.)
•

Advantages and Disadvantages of Network Topologies
Topology

Advantages

Disadvantages

Bus

Cheap. Easy to install.

Difficult to reconfigure.
Break in bus disables
entire network.

Star

Cheap. Easy to install.
Easy to reconfigure.
Fault tolerant.

More expensive than bus.

Ring

Efficient. Easy to install.

Reconfiguration difficult.
Very expensive.

Mesh

Simplest. Most fault tolerant.

Reconfiguration extremely difficult.
Extremely expensive.
Very complex.
Transmission Mode
The term transmission mode is used to define the
direction of signal flow between two linked devices.
There three types of transmission modes: simplex, halfduplex and full-duplex
Simplex:In simplex mode, the communication is
unidirectional, as one-way street.
• Examples: keyboards and traditional monitors are both
examples of simplex devices.
Half-Duplex: In half-duplex mode, each station can both
transmit and receive, but not at the same time. When one
device is sending, the other can only receive, and vice versa.
Examples: Walkie-talkies and CB (citizen’s band) radios are both
half-duplex systems.
Full-Duplex: In a full-duplex mode (also called
duplex), both stations can transmit and receive
simultaneously.
Examples: the telephone network
Categories of Networks
LANs
• A local area network (LAN) is usually privately
owned and links the devices in a single office,
building or campus. Currently, LAN size is
limited to a few kilometers.
• LANs are designed to allow resources be
shared between personal computers or
workstations. The resources to be shared can
include hardware (e.g. a printer), software (e.g.
an application program), or data.
• In general, LANs use only one type of transmission medium.
• The most common LAN topologies are bus, ring and star.
• LANs have data rates in the 4 to 16Mbs range. Today, however,
speeds are increasing and can reach 100Mbps with gigabit
systems in development.
Metropolitan Area Networks
• A metropolitan area network (MAN) is designed to extend over
an entire city.
• A MAN may be wholly owned and operated by a private
company, or it may be a service provided by a public company,
such as a local telephone company.
MAN
Wide Area Network
A Wide Area Network
(WAN) provides longdistance transmission
of data, voice, image,
and video information
over large geographical
areas that may
comprise a country, a
continent, or even the
whole world.

Más contenido relacionado

La actualidad más candente

Computer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhuComputer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhuNarenderSinghSandhu2
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingMayank Jain
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 
Networking ppt by swapi
Networking ppt by swapi Networking ppt by swapi
Networking ppt by swapi Swapi Pawar
 
Physical and logical topologies in computer network and client server
Physical  and logical topologies in computer network and client serverPhysical  and logical topologies in computer network and client server
Physical and logical topologies in computer network and client serverSatya P. Joshi
 
Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to NetworkingMohammed Adam
 
Networking presentation
Networking presentationNetworking presentation
Networking presentationJyoti Tewari
 
Computer Networks basics and OSI
Computer Networks basics and OSIComputer Networks basics and OSI
Computer Networks basics and OSICS_GDRCST
 
Computer network
Computer networkComputer network
Computer networkRahul Das
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic conceptsrahul kapoliya
 

La actualidad más candente (20)

Computer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhuComputer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhu
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Unit2
Unit2Unit2
Unit2
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Networks PPT
Networks PPTNetworks PPT
Networks PPT
 
Networking ppt by swapi
Networking ppt by swapi Networking ppt by swapi
Networking ppt by swapi
 
Computer network
Computer networkComputer network
Computer network
 
Network topology
Network topologyNetwork topology
Network topology
 
Physical and logical topologies in computer network and client server
Physical  and logical topologies in computer network and client serverPhysical  and logical topologies in computer network and client server
Physical and logical topologies in computer network and client server
 
Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to Networking
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
3.1.2 classification of network
3.1.2 classification of network3.1.2 classification of network
3.1.2 classification of network
 
Computer Networks basics and OSI
Computer Networks basics and OSIComputer Networks basics and OSI
Computer Networks basics and OSI
 
Computer network
Computer networkComputer network
Computer network
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
Computer network
Computer  networkComputer  network
Computer network
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Network And Topology
Network And TopologyNetwork And Topology
Network And Topology
 

Destacado

Network topologies
Network topologiesNetwork topologies
Network topologiesOnline
 
Ali hassan khan gurmani fiber optics
Ali hassan khan gurmani fiber opticsAli hassan khan gurmani fiber optics
Ali hassan khan gurmani fiber opticsali814
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingmartuj
 
Data communication and computer networks
Data communication and computer networksData communication and computer networks
Data communication and computer networksmarwa_ma
 
Basic 2-bop and imf & world bank
Basic 2-bop and imf & world bankBasic 2-bop and imf & world bank
Basic 2-bop and imf & world bankasharma2001
 
Fundamentals of Enterprise Networks
Fundamentals ofEnterprise NetworksFundamentals ofEnterprise Networks
Fundamentals of Enterprise NetworksVisualBee.com
 
International business notes
International business notesInternational business notes
International business notesSumit Palwe
 
ITFT_Transmission modes
ITFT_Transmission modesITFT_Transmission modes
ITFT_Transmission modesSwati Aggarwal
 
International trade notes
International trade notes International trade notes
International trade notes Mrdasilvasjha
 
OSI Model - Every Detail Explained
OSI Model - Every Detail ExplainedOSI Model - Every Detail Explained
OSI Model - Every Detail ExplainedAshish Malik
 
Computer Network Topologies (with animations)
Computer Network Topologies (with animations)Computer Network Topologies (with animations)
Computer Network Topologies (with animations)Damian T. Gordon
 
The world trade organization (wto)
The world trade organization (wto)The world trade organization (wto)
The world trade organization (wto)Tinaaz Wadia
 
Network topologies
Network topologiesNetwork topologies
Network topologiesNorah Saad
 

Destacado (20)

Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Ali hassan khan gurmani fiber optics
Ali hassan khan gurmani fiber opticsAli hassan khan gurmani fiber optics
Ali hassan khan gurmani fiber optics
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Data communication and computer networks
Data communication and computer networksData communication and computer networks
Data communication and computer networks
 
Basic 2-bop and imf & world bank
Basic 2-bop and imf & world bankBasic 2-bop and imf & world bank
Basic 2-bop and imf & world bank
 
International trade lecture_notes
International trade lecture_notesInternational trade lecture_notes
International trade lecture_notes
 
Fundamentals of Enterprise Networks
Fundamentals ofEnterprise NetworksFundamentals ofEnterprise Networks
Fundamentals of Enterprise Networks
 
International business notes
International business notesInternational business notes
International business notes
 
ITFT_Transmission modes
ITFT_Transmission modesITFT_Transmission modes
ITFT_Transmission modes
 
International trade notes
International trade notes International trade notes
International trade notes
 
Memory types
Memory typesMemory types
Memory types
 
Secondary Storage
Secondary StorageSecondary Storage
Secondary Storage
 
OSI Model - Every Detail Explained
OSI Model - Every Detail ExplainedOSI Model - Every Detail Explained
OSI Model - Every Detail Explained
 
Computer Network Topologies (with animations)
Computer Network Topologies (with animations)Computer Network Topologies (with animations)
Computer Network Topologies (with animations)
 
Osi model
Osi modelOsi model
Osi model
 
The world trade organization (wto)
The world trade organization (wto)The world trade organization (wto)
The world trade organization (wto)
 
Wto ppt
Wto pptWto ppt
Wto ppt
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 

Similar a ( Network topology) )final

1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdfsophia763824
 
1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdfJamesOtieno34
 
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxSuratSingh18
 
1-introduction-to-computer-networking-converted 2.pptx
1-introduction-to-computer-networking-converted 2.pptx1-introduction-to-computer-networking-converted 2.pptx
1-introduction-to-computer-networking-converted 2.pptxYashwant Srikrishnan
 
Dc lec-03 (topologies)
Dc lec-03  (topologies)Dc lec-03  (topologies)
Dc lec-03 (topologies)diaryinc
 
Chapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBChapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBdhanashrisabale1
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxAASTHAJAJOO
 
NETWORK TESCHNOLOGY.pptx
NETWORK TESCHNOLOGY.pptxNETWORK TESCHNOLOGY.pptx
NETWORK TESCHNOLOGY.pptxYasaraDevindi
 
network topology _computer networks.pptx
network  topology _computer networks.pptxnetwork  topology _computer networks.pptx
network topology _computer networks.pptxManimegalaM3
 
Topology in Computer Network.pptx
Topology in Computer Network.pptxTopology in Computer Network.pptx
Topology in Computer Network.pptx454Saif
 

Similar a ( Network topology) )final (20)

1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf
 
1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
 
1-introduction-to-computer-networking-converted 2.pptx
1-introduction-to-computer-networking-converted 2.pptx1-introduction-to-computer-networking-converted 2.pptx
1-introduction-to-computer-networking-converted 2.pptx
 
Dc lec-03 (topologies)
Dc lec-03  (topologies)Dc lec-03  (topologies)
Dc lec-03 (topologies)
 
Networks topologies Lec#2
Networks topologies Lec#2Networks topologies Lec#2
Networks topologies Lec#2
 
Chapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBChapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMB
 
Chapter 1 ppt by dmb
Chapter 1 ppt by dmbChapter 1 ppt by dmb
Chapter 1 ppt by dmb
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptx
 
Network topology
Network topologyNetwork topology
Network topology
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
NETWORK TESCHNOLOGY.pptx
NETWORK TESCHNOLOGY.pptxNETWORK TESCHNOLOGY.pptx
NETWORK TESCHNOLOGY.pptx
 
Krisom
KrisomKrisom
Krisom
 
network topology _computer networks.pptx
network  topology _computer networks.pptxnetwork  topology _computer networks.pptx
network topology _computer networks.pptx
 
NETWORK TOPOLOGIES (NETWORK TOPOLOGY)
NETWORK TOPOLOGIES (NETWORK TOPOLOGY)NETWORK TOPOLOGIES (NETWORK TOPOLOGY)
NETWORK TOPOLOGIES (NETWORK TOPOLOGY)
 
Unit2.2
Unit2.2Unit2.2
Unit2.2
 
Network Topology
Network Topology Network Topology
Network Topology
 
Topology in Computer Network.pptx
Topology in Computer Network.pptxTopology in Computer Network.pptx
Topology in Computer Network.pptx
 

Último

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Último (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

( Network topology) )final

  • 1. Line Configuration • • • 1. 2. • Line configuration refers to the way two or more communication devices attach to a link. A link is the physical communication pathway that transfers data from one device to another. There are two line configurations: Point-to-Point Multipoint A point-to-point line configuration provides a dedicated link between two devices. The entire capacity of the channel is reserved for transmission between those two devices.
  • 3. • A multipoint line configuration is one in which more than two specific devices share a single link. In a multipoint environment, the capacity of the channel is shared, either spatially or temporally. • If several devices can use the link simultaneously, it is a spatially shared line configuration. • If users must take turns, it is a time-shared line configuration.
  • 5. Network topology • A topology is a way of “laying out” the network. Topologies can be either physical or logical. • Physical topologies describe how the cables are run. • Logical topologies describe how the network messages travel
  • 6. Network topology (cont.) • • • • Bus (can be both logical and physical) Star (physical only) Ring (can be both logical and physical) Mesh (can be both logical and physical)
  • 7. Network topology (cont.) Bus • A bus is the simplest physical topology. It consists of a single cable that runs to every workstation • This topology uses the least amount of cabling, but also covers the shortest amount of distance. • Each computer shares the same data and address path. With a logical bus topology, messages pass through the trunk, and each workstation checks to see if the message is addressed to itself. If the address of the message matches the workstation’s address, the network adapter copies the message to the card’s on-board memory.
  • 8. Network topology (cont.) • it is difficult to add a workstation • have to completely reroute the cable and possibly run two additional lengths of it. • if any one of the cables breaks, the entire network is disrupted. Therefore, it is very expensive to maintain.
  • 10. Network topology (cont.) Star Topology • A physical star topology branches each network device off a central device called a hub, making it very easy to add a new workstation. • Also, if any workstation goes down it does not affect the entire network. (But, as you might expect, if the central device goes down, the entire network goes down.) • Some types of Ethernet and ARCNet use a physical star topology.
  • 11. Network topology (cont.) • Star topologies are easy to install. A cable is run from each workstation to the hub. The hub is placed in a central location in the office. • Star topologies are more expensive to install than bus networks, because there are several more cables that need to be installed, plus the cost of the hubs that are needed.
  • 13. Network topology (cont.) Ring • Each computer connects to two other computers, joining them in a circle creating a unidirectional path where messages move workstation to workstation. • Each entity participating in the ring reads a message, then regenerates it and hands it to its neighbor on a different network cable.
  • 14. Network topology (cont.) • The ring makes it difficult to add new computers. • Unlike a star topology network, the ring topology network will go down if one entity is removed from the ring. • Physical ring topology systems don’t exist much anymore, mainly because the hardware involved was fairly expensive and the fault tolerance was very low.
  • 16. Network topology (cont.) Mesh • The mesh topology is the simplest logical topology in terms of data flow, but it is the most complex in terms of physical design. • In this physical topology, each device is connected to every other device. • This topology is rarely found in LANs, mainly because of the complexity of the cabling.
  • 17. Network topology (cont.) • Because of its design, the physical mesh topology is very expensive to install and maintain. • Cables must be run from each device to every other device. The advantage you gain from it is its high fault tolerance. • With a logical mesh topology, however, there will always be a way of getting the data from source to destination. • It may not be able to take the direct route, but it can take an alternate, indirect route. It is for this reason that the mesh topology is still found in WANs to connect multiple sites across WAN links. It uses devices called routers to search multiple routes through the mesh and determine the best path. • However, the mesh topology does become inefficient with five or more entities.
  • 19. Network topology (cont.) • Advantages and Disadvantages of Network Topologies Topology Advantages Disadvantages Bus Cheap. Easy to install. Difficult to reconfigure. Break in bus disables entire network. Star Cheap. Easy to install. Easy to reconfigure. Fault tolerant. More expensive than bus. Ring Efficient. Easy to install. Reconfiguration difficult. Very expensive. Mesh Simplest. Most fault tolerant. Reconfiguration extremely difficult. Extremely expensive. Very complex.
  • 20. Transmission Mode The term transmission mode is used to define the direction of signal flow between two linked devices. There three types of transmission modes: simplex, halfduplex and full-duplex Simplex:In simplex mode, the communication is unidirectional, as one-way street.
  • 21. • Examples: keyboards and traditional monitors are both examples of simplex devices. Half-Duplex: In half-duplex mode, each station can both transmit and receive, but not at the same time. When one device is sending, the other can only receive, and vice versa. Examples: Walkie-talkies and CB (citizen’s band) radios are both half-duplex systems.
  • 22. Full-Duplex: In a full-duplex mode (also called duplex), both stations can transmit and receive simultaneously. Examples: the telephone network
  • 24. LANs • A local area network (LAN) is usually privately owned and links the devices in a single office, building or campus. Currently, LAN size is limited to a few kilometers. • LANs are designed to allow resources be shared between personal computers or workstations. The resources to be shared can include hardware (e.g. a printer), software (e.g. an application program), or data.
  • 25.
  • 26. • In general, LANs use only one type of transmission medium. • The most common LAN topologies are bus, ring and star. • LANs have data rates in the 4 to 16Mbs range. Today, however, speeds are increasing and can reach 100Mbps with gigabit systems in development. Metropolitan Area Networks • A metropolitan area network (MAN) is designed to extend over an entire city. • A MAN may be wholly owned and operated by a private company, or it may be a service provided by a public company, such as a local telephone company.
  • 27. MAN
  • 28. Wide Area Network A Wide Area Network (WAN) provides longdistance transmission of data, voice, image, and video information over large geographical areas that may comprise a country, a continent, or even the whole world.