SlideShare a Scribd company logo
1 of 23
Course Instructor : Sehrish Rafiq
Department Of Computer Science
University Of Peshawar
Data Communications & Networking
Lecture-03
Lecture overview
Topology
 Mesh
 Star
 Tree
 Ring
 Bus
Topology
 The term topology refers to the way a network is laid out, either
physically or logically.
 Two or more devices connect to a link.
 Two or more links form a topology.
 The topology of a network is the geometric representation of the
relationship of all the links and linking devices(usually called nodes) to
each other.
 The topology describes that how the devices in a network are
interconnected rather than their physical arrangement.
Topology continued…
 A consideration when choosing a topology is the relative status of the devices to
be linked.
 Two relationships are possible.
 Peer-to-Peer: where the devices share the link equally.
 Primary-Secondary: where one device controls traffic and the others can
transmit through it.
 Five basic topologies
 Bus
 Star
 Mesh
 Tree
 Ring
 Note: Ring & Mesh topologies are more convenient for Peer-to-Peer transmission while star &
Tree topologies are better for primary–secondary transmission. A bus topology is convenient for
either.
Mesh topology
Mesh topology
In mesh topology every device has a dedicated point-to-point link
to every other device.
The term dedicated means that the link carries traffic only
between the two devices it connects.
A fully connected mesh network has n(n-1)/2 physical channels to
link n devices and every device must have n-1 I/O ports.
Mesh topology continued…
 Advantages:
 Each connection can carry its own data load.
 This topology is robust. If one link becomes unusable, it does not affect the entire
system.
 Privacy or security
 Easy fault identification.
 Disadvantages:
 Large amount of cabling & I/O ports are required.
 Installation & reconfiguration are difficult because every device must be connected to
every other device.
 The bulk of wiring can be greater than the available space( in walls, ceilings or floors)
can accommodate.
 The hardware(I/O ports & cabling) required to make a fully connected mesh network
can be prohibitively expensive.
Star Topology
 Each device has a dedicated point-to-point link only to a central controller
usually called a hub.
 The devices are not directly connected to each other.
 Like mesh a star topology does not allow direct traffic between devices.
Star Topology Continued…
 If one device wants to send data to another, It sends data to the controller
which then relays the data to the other connected device.
 Usually two types of Hubs are available.
 Passive Hub
 Active Hub
Types of Hubs
 Passive Hub:
 A passive Hub is used to connect computers in a broadcast network.
 The signal sent to a passive hub is sent to all workstations without any
regeneration or amplification.
 Passive hubs do not require any external power source.
 Active Hub:
 An active hub uses an external power source and regenerates the signal,
therefore greater cable distances are allowed.
 A switched hub directs the signal directly to the recipient.
 Active hubs also contain diagnostic features to aid in network trouble shooting.
 Active Hub is more expensive than a passive Hub.
Advantages of using star topology
 A star topology is less expensive than a mesh topology.
 Each device needs only one cable and one I/O port to connect with any
number of devices.
 Easy to install and easy to reconfigure.
 Far less cabling is required therefore space problems are rare.
 Addition, deletions and moves involve only one connection between that
device and hub.
 If a link fails only that link is affected.
 Easy fault identification & fault isolation because of central Hub.
Disadvantages of using star topology
 More cabling than any other topology(such as bus, ring or tree ) except Mesh
because every device must be connected to the central hub.
 Active hub is expensive.
 A central hub failure can damage the whole network.
Tree Topology
Tree topology
 A variation of star topology.
 As in star, nodes in a tree are linked to a central Hub that controls the traffic to
the Network.
 However, not every device is directly plugged in to the central Hub.
 The majority of the devices connect to a secondary Hub that in turn is
connected to the central Hub.
 The central Hub in the tree is an active Hub.
Tree topology continued…
 An active Hub contains a repeater which is a hardware device that regenerates
the received bit patterns before sending them out.
 Repeating strengthens transmissions and increases the distance a signal can
travel.
 The secondary Hubs may be active or passive hubs.
 A passive Hub provides a simple physical connection between the attached
devices.
Advantages & Disadvantages of using Tree
 The advantages and disadvantages of tree are almost the same to that of star.
 However, because of the addition of secondary Hubs more devices can be
connected with the central Hub and can increase the distance a signal can
travel.
 It allows the network to isolate and prioritize communications from different
computers.
 By means of prioritizing, the network designers and operator can guarantee that
time-sensitive data will not have to wait for access to the network.
Bus Topology
 A Bus topology is a multipoint.
 One long cable acts as a backbone to link all the devices in a network.
 Nodes are connected to the bus cable by drop lines and taps.
 A drop line is a connection running between the device and the main cable.
 A tap is a connector that either splices in to the main cable or punctures the
sheathing of a cable to create a contact with the metallic core.
Bus topology Continued…
 As a signal travels along the backbone,some of its energy is transformed in to
heat.
 Therefore it becomes weaker and weaker.
 For this reason there is a limit on the number of taps a bus can support and on
the distance between those taps.
Advantages & Disadvantages of using bus
topology
 Advantages:
 Ease of installation.
 Less cabling than mesh, star or tree.
 Only one backbone cable stretches through the entire facility.
 For n devices to connect only one backbone cable and n drop lines are needed.
 Disadvantages:
 Difficult reconfiguration and fault isolation.
 It can be difficult to add new devices.
 Signal reflection problem.
 Adding new devices may require replacement of the backbone.
 A fault in backbone can damage the entire network causing noise problems in
both directions.
Ring Topology
 In ring topology every device has a dedicated point to point line configuration
only with the two devices on either side of it.
 A signal is passed along the ring in one direction from device to device until it
reaches its destination.
 Each device in the ring incorporates a repeater.
 Token passing is frequently used in ring topology.
Advantages & disadvantages of using ring
topology
 Advantages:
 Easy to install and easy to reconfigure.
 Adding and deleting a device only involves two connections.
 Easy fault isolation.
 If one device does not receive a signal within a specified period,it can issue an
alarm.
 Disadvantage:
 Uni-directional traffic.
 A break in a ring can disable the entire network.
 This weakness can be solved by a dual ring.
Hybrid Topologies
Often a network combines several topologies as subnetworks
linked together in a large topology.
For example, one department of a buisness may have decided to
use a bus topology while another department has a ring.
All can be connected with a central controller in a star toplogy.
Have a useful sunday!

More Related Content

What's hot

network essential ppt
network essential pptnetwork essential ppt
network essential pptVikas Tiwari
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topologyMaksudujjaman
 
Types of Network Topologies
Types of Network TopologiesTypes of Network Topologies
Types of Network TopologiesYusuf Khan
 
CCNA_Data Communication and Computer Networking
CCNA_Data  Communication and Computer Networking CCNA_Data  Communication and Computer Networking
CCNA_Data Communication and Computer Networking Tariqul Islam Shohag
 
Networking Topologies in Computers
Networking Topologies in ComputersNetworking Topologies in Computers
Networking Topologies in ComputersAnkur Pandey
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabhaSuprabha Sahoo
 
Network topology
Network topologyNetwork topology
Network topologylekshmik
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application pptNitesh Dubey
 
Network topology
Network topologyNetwork topology
Network topologyjasmeen kr
 
Types of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterTypes of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterAlidHasan4
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologiesAyush0734
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologiesdbrown1
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks Jubayer Alam Shoikat
 
Networking presentation
Networking presentationNetworking presentation
Networking presentationJyoti Tewari
 
Network topologies for management
Network topologies for managementNetwork topologies for management
Network topologies for managementSaugata Palit
 

What's hot (20)

network essential ppt
network essential pptnetwork essential ppt
network essential ppt
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
 
Types of Network Topologies
Types of Network TopologiesTypes of Network Topologies
Types of Network Topologies
 
Osi model
Osi modelOsi model
Osi model
 
CCNA_Data Communication and Computer Networking
CCNA_Data  Communication and Computer Networking CCNA_Data  Communication and Computer Networking
CCNA_Data Communication and Computer Networking
 
Computer network
Computer  networkComputer  network
Computer network
 
Networking Topologies in Computers
Networking Topologies in ComputersNetworking Topologies in Computers
Networking Topologies in Computers
 
Network And Topology
Network And TopologyNetwork And Topology
Network And Topology
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabha
 
Network topology
Network topologyNetwork topology
Network topology
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application ppt
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
 
Network topology
Network topologyNetwork topology
Network topology
 
Types of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterTypes of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouter
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologies
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 
Network topologies for management
Network topologies for managementNetwork topologies for management
Network topologies for management
 

Similar to Lecture 03

Network Topology In Computer Network 6-Types of topologies.pdf
Network Topology In Computer Network  6-Types of topologies.pdfNetwork Topology In Computer Network  6-Types of topologies.pdf
Network Topology In Computer Network 6-Types of topologies.pdfsunil shukla
 
Network topology
Network topologyNetwork topology
Network topologyStudent
 
Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01Sayyed Nawaz
 
COMPUTER NETWORK TOPOLOGY
COMPUTER NETWORK TOPOLOGY COMPUTER NETWORK TOPOLOGY
COMPUTER NETWORK TOPOLOGY Sayma Sultana
 
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxSuratSingh18
 
Presentation on topology by kalyan kk
Presentation on topology by kalyan kkPresentation on topology by kalyan kk
Presentation on topology by kalyan kkkalyan kumar
 
Presentation on topology
Presentation on topologyPresentation on topology
Presentation on topologykalyan kumar
 
Topology munsifullah daudzaikhurasan university
Topology munsifullah daudzaikhurasan university Topology munsifullah daudzaikhurasan university
Topology munsifullah daudzaikhurasan university Munsif Ullah
 
Network Topologies in computer networking
Network Topologies in computer networkingNetwork Topologies in computer networking
Network Topologies in computer networkingnazmulabdal
 
Networktopology xii
Networktopology xiiNetworktopology xii
Networktopology xiisaltyp
 
Network topology
Network topologyNetwork topology
Network topologyArjonDando1
 
Topography
TopographyTopography
Topographyrosu555
 

Similar to Lecture 03 (20)

Network Topology In Computer Network 6-Types of topologies.pdf
Network Topology In Computer Network  6-Types of topologies.pdfNetwork Topology In Computer Network  6-Types of topologies.pdf
Network Topology In Computer Network 6-Types of topologies.pdf
 
Network topology
Network topologyNetwork topology
Network topology
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
 
Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01
 
Network topology
Network topologyNetwork topology
Network topology
 
COMPUTER NETWORK TOPOLOGY
COMPUTER NETWORK TOPOLOGY COMPUTER NETWORK TOPOLOGY
COMPUTER NETWORK TOPOLOGY
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
 
Presentation on topology by kalyan kk
Presentation on topology by kalyan kkPresentation on topology by kalyan kk
Presentation on topology by kalyan kk
 
Presentation on topology
Presentation on topologyPresentation on topology
Presentation on topology
 
Topology munsifullah daudzaikhurasan university
Topology munsifullah daudzaikhurasan university Topology munsifullah daudzaikhurasan university
Topology munsifullah daudzaikhurasan university
 
Network Topologies in computer networking
Network Topologies in computer networkingNetwork Topologies in computer networking
Network Topologies in computer networking
 
Networktopology xii
Networktopology xiiNetworktopology xii
Networktopology xii
 
Network topology
Network topologyNetwork topology
Network topology
 
Topology
Topology Topology
Topology
 
report.pptx
report.pptxreport.pptx
report.pptx
 
Topology
TopologyTopology
Topology
 
Network topology And Its type
Network topology And Its typeNetwork topology And Its type
Network topology And Its type
 
Topography
TopographyTopography
Topography
 
Class work3
Class work3Class work3
Class work3
 

More from Sehrish Rafiq

Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Sehrish Rafiq
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Sehrish Rafiq
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Sehrish Rafiq
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Sehrish Rafiq
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Sehrish Rafiq
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Sehrish Rafiq
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Sehrish Rafiq
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Sehrish Rafiq
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Sehrish Rafiq
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Sehrish Rafiq
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Sehrish Rafiq
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Sehrish Rafiq
 

More from Sehrish Rafiq (20)

Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16
 
Lecture 24
Lecture 24Lecture 24
Lecture 24
 
Lecture 18
Lecture 18Lecture 18
Lecture 18
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 

Recently uploaded

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 

Recently uploaded (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 

Lecture 03

  • 1. Course Instructor : Sehrish Rafiq Department Of Computer Science University Of Peshawar Data Communications & Networking Lecture-03
  • 2. Lecture overview Topology  Mesh  Star  Tree  Ring  Bus
  • 3. Topology  The term topology refers to the way a network is laid out, either physically or logically.  Two or more devices connect to a link.  Two or more links form a topology.  The topology of a network is the geometric representation of the relationship of all the links and linking devices(usually called nodes) to each other.  The topology describes that how the devices in a network are interconnected rather than their physical arrangement.
  • 4. Topology continued…  A consideration when choosing a topology is the relative status of the devices to be linked.  Two relationships are possible.  Peer-to-Peer: where the devices share the link equally.  Primary-Secondary: where one device controls traffic and the others can transmit through it.  Five basic topologies  Bus  Star  Mesh  Tree  Ring  Note: Ring & Mesh topologies are more convenient for Peer-to-Peer transmission while star & Tree topologies are better for primary–secondary transmission. A bus topology is convenient for either.
  • 6. Mesh topology In mesh topology every device has a dedicated point-to-point link to every other device. The term dedicated means that the link carries traffic only between the two devices it connects. A fully connected mesh network has n(n-1)/2 physical channels to link n devices and every device must have n-1 I/O ports.
  • 7. Mesh topology continued…  Advantages:  Each connection can carry its own data load.  This topology is robust. If one link becomes unusable, it does not affect the entire system.  Privacy or security  Easy fault identification.  Disadvantages:  Large amount of cabling & I/O ports are required.  Installation & reconfiguration are difficult because every device must be connected to every other device.  The bulk of wiring can be greater than the available space( in walls, ceilings or floors) can accommodate.  The hardware(I/O ports & cabling) required to make a fully connected mesh network can be prohibitively expensive.
  • 8. Star Topology  Each device has a dedicated point-to-point link only to a central controller usually called a hub.  The devices are not directly connected to each other.  Like mesh a star topology does not allow direct traffic between devices.
  • 9. Star Topology Continued…  If one device wants to send data to another, It sends data to the controller which then relays the data to the other connected device.  Usually two types of Hubs are available.  Passive Hub  Active Hub
  • 10. Types of Hubs  Passive Hub:  A passive Hub is used to connect computers in a broadcast network.  The signal sent to a passive hub is sent to all workstations without any regeneration or amplification.  Passive hubs do not require any external power source.  Active Hub:  An active hub uses an external power source and regenerates the signal, therefore greater cable distances are allowed.  A switched hub directs the signal directly to the recipient.  Active hubs also contain diagnostic features to aid in network trouble shooting.  Active Hub is more expensive than a passive Hub.
  • 11. Advantages of using star topology  A star topology is less expensive than a mesh topology.  Each device needs only one cable and one I/O port to connect with any number of devices.  Easy to install and easy to reconfigure.  Far less cabling is required therefore space problems are rare.  Addition, deletions and moves involve only one connection between that device and hub.  If a link fails only that link is affected.  Easy fault identification & fault isolation because of central Hub.
  • 12. Disadvantages of using star topology  More cabling than any other topology(such as bus, ring or tree ) except Mesh because every device must be connected to the central hub.  Active hub is expensive.  A central hub failure can damage the whole network.
  • 14. Tree topology  A variation of star topology.  As in star, nodes in a tree are linked to a central Hub that controls the traffic to the Network.  However, not every device is directly plugged in to the central Hub.  The majority of the devices connect to a secondary Hub that in turn is connected to the central Hub.  The central Hub in the tree is an active Hub.
  • 15. Tree topology continued…  An active Hub contains a repeater which is a hardware device that regenerates the received bit patterns before sending them out.  Repeating strengthens transmissions and increases the distance a signal can travel.  The secondary Hubs may be active or passive hubs.  A passive Hub provides a simple physical connection between the attached devices.
  • 16. Advantages & Disadvantages of using Tree  The advantages and disadvantages of tree are almost the same to that of star.  However, because of the addition of secondary Hubs more devices can be connected with the central Hub and can increase the distance a signal can travel.  It allows the network to isolate and prioritize communications from different computers.  By means of prioritizing, the network designers and operator can guarantee that time-sensitive data will not have to wait for access to the network.
  • 17. Bus Topology  A Bus topology is a multipoint.  One long cable acts as a backbone to link all the devices in a network.  Nodes are connected to the bus cable by drop lines and taps.  A drop line is a connection running between the device and the main cable.  A tap is a connector that either splices in to the main cable or punctures the sheathing of a cable to create a contact with the metallic core.
  • 18. Bus topology Continued…  As a signal travels along the backbone,some of its energy is transformed in to heat.  Therefore it becomes weaker and weaker.  For this reason there is a limit on the number of taps a bus can support and on the distance between those taps.
  • 19. Advantages & Disadvantages of using bus topology  Advantages:  Ease of installation.  Less cabling than mesh, star or tree.  Only one backbone cable stretches through the entire facility.  For n devices to connect only one backbone cable and n drop lines are needed.  Disadvantages:  Difficult reconfiguration and fault isolation.  It can be difficult to add new devices.  Signal reflection problem.  Adding new devices may require replacement of the backbone.  A fault in backbone can damage the entire network causing noise problems in both directions.
  • 20. Ring Topology  In ring topology every device has a dedicated point to point line configuration only with the two devices on either side of it.  A signal is passed along the ring in one direction from device to device until it reaches its destination.  Each device in the ring incorporates a repeater.  Token passing is frequently used in ring topology.
  • 21. Advantages & disadvantages of using ring topology  Advantages:  Easy to install and easy to reconfigure.  Adding and deleting a device only involves two connections.  Easy fault isolation.  If one device does not receive a signal within a specified period,it can issue an alarm.  Disadvantage:  Uni-directional traffic.  A break in a ring can disable the entire network.  This weakness can be solved by a dual ring.
  • 22. Hybrid Topologies Often a network combines several topologies as subnetworks linked together in a large topology. For example, one department of a buisness may have decided to use a bus topology while another department has a ring. All can be connected with a central controller in a star toplogy.
  • 23. Have a useful sunday!