SlideShare una empresa de Scribd logo
1 de 19
Topology
 Topology is physical or logical arrangement of computer. The
physical topology of a network refers to the configuration of
cables, computers, and other peripherals.
 Physical topology should not be confused with logical topology
which is the method used to pass information between
workstations.
 It is the geometric representation of the relationship of all the
links and linking devices i.e. nodes to each other. Depending on
the need of an organization different arrangements of
computers are available.
Types of Topologies
Mesh Topology
Star Topology
Tree Topology
Bus Topology
Ring Topology
Mesh Topology
In mesh topology each node is
connected to every other node by direct links.
For n nodes , there would be n(n-1)/2 physical
links.

To accommodate that many links,
every device on the network must have n-1
input/output ports.
Every device has dedicated point to point link to
every other device.
Disadvantage
• The use of dedicated links will increase the
number of input/output ports.
• Installation and reconfiguration are difficult in
this topology.
• The hardware required to connect each other can
be prohibitively expensive.

• The cable length is much more in this topology
comparing to other.
Advantages
• The use of dedicated links guaranteed that each connection can
carry its own data.
• The Mesh topology does not have traffic congestion problems.
• Point to point links make fault identification and fault isolation easy
in this topology.
• It is also robust in nature. Of one link is down, all the rest of the
network can still continue.
• When every message sent travels along dedicated line, only
intended recipient sees it. Physical boundaries prevent other users
from gaining access to messages, so we can say that there is data
security.
Star Topology
• As we know that mesh topology have major drawback of
cabling that has been overcome here in star topology with a
special network device that is HUB.
• In star topology, each device has a dedicated point to point
link hub. The devices are not directly linked to each other.
• A star topology does not allow direct traffic between devices.
There devices can only communicate via the hub.
Advantages
• It is less expensive than mesh topology.
• Each device needs only one link and one input port to connect it to any
number of other.
• It is easy to install and reconfigure.
• Less cabling is required.
• Moves and deletion involves only connection between the device and the
hub.
• Robustness i.e. if one link fails, only that link is affected and so helps in
easy fault identification and fault isolation.
• Hub is used to monitor link problems and by pass defective links.
Disadvantages
• Two terminals/devices can’t interact directly
i.e. they have to go via central controller hub.
This leads to no privacy in the network.

• The network’s dependence on the main
computer is more i.e. if the central computer
(HUB) breaks down the entire network stops
functioning.
Tree Topology
• The tree topology is a variation of a star. The tree topology
requires the computer to be linked in a hierarchical way.
• Nodes in a tree are linked to a central hub that controls the
traffic to the network.
• Not every device plugs directly into the central hub. the
majority of devices connect to a secondary hub that in turn
is connected to the central hub.
• A central hub in the tree is an active hub. An active hub
contains a repeater.
Tree Topology
• Repeater is a hardware device that regenerates the
received bit patterns before sending them out.
• The secondary hubs may be active or passive hubs.
• A passive hub provides a simple physical connection
between the attached devices.
• The packets carrying the addresses of the destination
nodes should have the complete address i.e. all the
nodes above in the hierarchy must also have to be
mentioned.
Advantages
• Point to point wiring for individual segments.
• Supported by several hardware and software
vendors.
Disadvantages
• Overall length of each segment is limited by
the type of cabling used.
• Id the backbone line breaks, the entire
segment goes down.
• More difficult to configure and wire than
other topologies.
Bus Topology
• A linear bus topology consists of a main run of cable
with a terminator at each end.
• All nodes are connected to the linear cable.
• Ethernet and Local Talk Networks use a linear bus
topology.
• This topology is a multipoint configuration. One long
cable acts as backbone to link all the devices in the
network. All nodes are connected to bus that runs
through the network.
Bus Topology
• Drop line is a connection running between the device an
the main cable.
• A tap is a connector that either splices into the main cable.
• As a signal travels along the backbone, some of its energy is
transformed into heat.
• Signal becomes weaker and weaker when farther it has to
travel.

• There is a limit on the number of taps a bus can support
depending on the distance between those taps.
Advantages
• Easy to install. Easy to connect a computer or
peripheral to linear bus. Requires less cable
length.
• Backbone cable can be laid along the most
efficient path, then connected to the nodes by
drop line of various length.
• Only the backbone cable stretches through the
entire facility. Each drop line has to reach only as
far as the nearest point on the backbone.
Disadvantages
• Entire network shuts down if there is a break in
the main cable.
• Terminators are required at both ends of the
backbone cable.
• Difficult to identify the problem if the entire
network shuts down.

• Not meant to be used as a stand alone solution in
a large building.
Ring Topology
• In a ring topology, each device has dedicated point to
point line configuration only with two devices on either
side or it.
• A signal is passed along the ring in one direction from
device to device until it reaches its destination.
• Each device in the ring incorporates a repeater. When a
device receives a signal intended for another device.
• To connect n devices in a ring topology we need n
cable links.
Advantages
• A ring is relatively easy to install and reconfigure, each
device is linked only to its immediate neighbours.
• To add or delete a device requires moving only two
connections. The only constraints are media and traffic
considerations.
• Fault isolation is simplifies. In a ring a signal is
circulating at all times. If one device does not receive a
signal within a specified period. It can issue an alarm.
The alarm alerts the network operator of the problem
and its locations.
Disadvantages
• Supports unidirectional traffic.
• In a simple ring, a break in the ring can disable
the entire network. This weakness can be
solved by using dual ring.

Más contenido relacionado

La actualidad más candente (20)

Bus topology ppt
Bus topology pptBus topology ppt
Bus topology ppt
 
Presentation on network topology
Presentation on network topologyPresentation on network topology
Presentation on network topology
 
Topology
TopologyTopology
Topology
 
Star topology
Star topologyStar topology
Star topology
 
Star topology
Star topologyStar topology
Star topology
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network topology
Network topologyNetwork topology
Network topology
 
Network topology.
Network topology.Network topology.
Network topology.
 
Topology
TopologyTopology
Topology
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Computer network
Computer networkComputer network
Computer network
 
Network topology
Network topologyNetwork topology
Network topology
 
Network topology
Network topologyNetwork topology
Network topology
 
LAN (Local Area Network)
LAN (Local Area Network)LAN (Local Area Network)
LAN (Local Area Network)
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Computer networks and it's applications
Computer networks and it's applicationsComputer networks and it's applications
Computer networks and it's applications
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
Star topology ppt
Star topology pptStar topology ppt
Star topology ppt
 
Network Topology And Its Types
Network Topology And Its TypesNetwork Topology And Its Types
Network Topology And Its Types
 

Destacado

Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point ProtocolPhan Vuong
 
Geometry, Topology, and all of Your Wildest Dreams Will Come True
Geometry, Topology, and all of Your Wildest Dreams Will Come TrueGeometry, Topology, and all of Your Wildest Dreams Will Come True
Geometry, Topology, and all of Your Wildest Dreams Will Come TrueDon Sheehy
 
Service Primitives for Internet Scale Applications
Service Primitives for Internet Scale ApplicationsService Primitives for Internet Scale Applications
Service Primitives for Internet Scale ApplicationsAmr Awadallah
 
PPP (Point to Point Protocol)
PPP (Point to Point Protocol)PPP (Point to Point Protocol)
PPP (Point to Point Protocol)Ali Jafar
 
Network topology
Network topologyNetwork topology
Network topologyilakkiya
 
CAD Topology and Geometry Basics
CAD Topology and Geometry BasicsCAD Topology and Geometry Basics
CAD Topology and Geometry BasicsAndrey Dankevich
 
Physical and logical topologies in computer network and client server
Physical  and logical topologies in computer network and client serverPhysical  and logical topologies in computer network and client server
Physical and logical topologies in computer network and client serverSatya P. Joshi
 
Point to-point-protocol
Point to-point-protocolPoint to-point-protocol
Point to-point-protocolamigurumi21
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devicesKunal Bhansali
 

Destacado (20)

Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 
Topology
TopologyTopology
Topology
 
Geometry, Topology, and all of Your Wildest Dreams Will Come True
Geometry, Topology, and all of Your Wildest Dreams Will Come TrueGeometry, Topology, and all of Your Wildest Dreams Will Come True
Geometry, Topology, and all of Your Wildest Dreams Will Come True
 
1.network topology
1.network topology1.network topology
1.network topology
 
Service Primitives for Internet Scale Applications
Service Primitives for Internet Scale ApplicationsService Primitives for Internet Scale Applications
Service Primitives for Internet Scale Applications
 
Hardware3
Hardware3Hardware3
Hardware3
 
PPP (Point to Point Protocol)
PPP (Point to Point Protocol)PPP (Point to Point Protocol)
PPP (Point to Point Protocol)
 
Network topology
Network topologyNetwork topology
Network topology
 
CAD Topology and Geometry Basics
CAD Topology and Geometry BasicsCAD Topology and Geometry Basics
CAD Topology and Geometry Basics
 
Introduction to PPP
Introduction to PPPIntroduction to PPP
Introduction to PPP
 
Ch 17
Ch 17Ch 17
Ch 17
 
802.15.5 mesh topology
802.15.5  mesh topology802.15.5  mesh topology
802.15.5 mesh topology
 
IPV4 vs IPV6
IPV4 vs IPV6IPV4 vs IPV6
IPV4 vs IPV6
 
Physical and logical topologies in computer network and client server
Physical  and logical topologies in computer network and client serverPhysical  and logical topologies in computer network and client server
Physical and logical topologies in computer network and client server
 
Csma
CsmaCsma
Csma
 
Point to-point-protocol
Point to-point-protocolPoint to-point-protocol
Point to-point-protocol
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devices
 
Ip v4 & ip v6
Ip v4 & ip v6Ip v4 & ip v6
Ip v4 & ip v6
 
CSMA/CD
CSMA/CDCSMA/CD
CSMA/CD
 

Similar a Topology

network topology _computer networks.pptx
network  topology _computer networks.pptxnetwork  topology _computer networks.pptx
network topology _computer networks.pptxManimegalaM3
 
networktopology-final.pptx
networktopology-final.pptxnetworktopology-final.pptx
networktopology-final.pptxBhuvanaR13
 
Topology in Computer Network.pptx
Topology in Computer Network.pptxTopology in Computer Network.pptx
Topology in Computer Network.pptx454Saif
 
networktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdfnetworktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdfamanchaube0143
 
networktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdfnetworktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdfamanchaube0143
 
05 network typologies
05 network typologies05 network typologies
05 network typologiesJadavsejal
 
networktopology.pptx
networktopology.pptxnetworktopology.pptx
networktopology.pptxmani651780
 
3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2JAIGANESH SEKAR
 
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxSuratSingh18
 
Network topology
Network topologyNetwork topology
Network topologyAnindyaNag5
 
sp...mads
sp...madssp...mads
sp...madspgj17
 
lecture 2,3.pdf
lecture 2,3.pdflecture 2,3.pdf
lecture 2,3.pdfuseless45
 
Network topologies
Network topologiesNetwork topologies
Network topologiesChirag Nag
 
Types of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterTypes of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterAlidHasan4
 

Similar a Topology (20)

network topology _computer networks.pptx
network  topology _computer networks.pptxnetwork  topology _computer networks.pptx
network topology _computer networks.pptx
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
networktopology-final.pptx
networktopology-final.pptxnetworktopology-final.pptx
networktopology-final.pptx
 
Topology in Computer Network.pptx
Topology in Computer Network.pptxTopology in Computer Network.pptx
Topology in Computer Network.pptx
 
networktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdfnetworktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdf
 
networktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdfnetworktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdf
 
05 network typologies
05 network typologies05 network typologies
05 network typologies
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
networktopology.pptx
networktopology.pptxnetworktopology.pptx
networktopology.pptx
 
3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2
 
Unit2
Unit2Unit2
Unit2
 
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
 
Presentation2-2.pptx
Presentation2-2.pptxPresentation2-2.pptx
Presentation2-2.pptx
 
Network topology
Network topologyNetwork topology
Network topology
 
sp...mads
sp...madssp...mads
sp...mads
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
lecture 2,3.pdf
lecture 2,3.pdflecture 2,3.pdf
lecture 2,3.pdf
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Types of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterTypes of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouter
 
Krisom
KrisomKrisom
Krisom
 

Más de One97 Communications Limited

WAP to invoke constructors using super keyword in java
WAP to invoke constructors using super keyword in javaWAP to invoke constructors using super keyword in java
WAP to invoke constructors using super keyword in javaOne97 Communications Limited
 
WAP to find out whether the number is prime or not in java
WAP to find out whether the number is prime or not in javaWAP to find out whether the number is prime or not in java
WAP to find out whether the number is prime or not in javaOne97 Communications Limited
 
How to achieve multiple inheritances by using interface in java
How to achieve multiple inheritances by using interface in java How to achieve multiple inheritances by using interface in java
How to achieve multiple inheritances by using interface in java One97 Communications Limited
 
WAP to implement inheritance and overloading methods in java
WAP to implement inheritance and overloading methods in javaWAP to implement inheritance and overloading methods in java
WAP to implement inheritance and overloading methods in javaOne97 Communications Limited
 
WAP to initialize different objects with different values in java
WAP to initialize different objects with different values in javaWAP to initialize different objects with different values in java
WAP to initialize different objects with different values in javaOne97 Communications Limited
 

Más de One97 Communications Limited (20)

Er. Model Of Hospital Management
Er. Model Of Hospital ManagementEr. Model Of Hospital Management
Er. Model Of Hospital Management
 
Financial
FinancialFinancial
Financial
 
Railway
RailwayRailway
Railway
 
Library
LibraryLibrary
Library
 
Fcfs Cpu Scheduling With Gantt Chart
Fcfs Cpu Scheduling With Gantt ChartFcfs Cpu Scheduling With Gantt Chart
Fcfs Cpu Scheduling With Gantt Chart
 
Neural Interfacing
Neural Interfacing Neural Interfacing
Neural Interfacing
 
Blue eye technology
Blue eye technology Blue eye technology
Blue eye technology
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Backtrack
BacktrackBacktrack
Backtrack
 
Protect Folders without using any Software
Protect Folders without using any SoftwareProtect Folders without using any Software
Protect Folders without using any Software
 
Introduction to Java Programming
Introduction to Java ProgrammingIntroduction to Java Programming
Introduction to Java Programming
 
WAP to invoke constructors using super keyword in java
WAP to invoke constructors using super keyword in javaWAP to invoke constructors using super keyword in java
WAP to invoke constructors using super keyword in java
 
WAP to find out whether the number is prime or not in java
WAP to find out whether the number is prime or not in javaWAP to find out whether the number is prime or not in java
WAP to find out whether the number is prime or not in java
 
Overriding abstract in java
Overriding abstract in javaOverriding abstract in java
Overriding abstract in java
 
How to achieve multiple inheritances by using interface in java
How to achieve multiple inheritances by using interface in java How to achieve multiple inheritances by using interface in java
How to achieve multiple inheritances by using interface in java
 
Method overriding in java
Method overriding in javaMethod overriding in java
Method overriding in java
 
WAP to implement inheritance and overloading methods in java
WAP to implement inheritance and overloading methods in javaWAP to implement inheritance and overloading methods in java
WAP to implement inheritance and overloading methods in java
 
program on Function overloading in java
program on  Function overloading in javaprogram on  Function overloading in java
program on Function overloading in java
 
Program on usage of Final keyword in java
Program on usage of  Final keyword in javaProgram on usage of  Final keyword in java
Program on usage of Final keyword in java
 
WAP to initialize different objects with different values in java
WAP to initialize different objects with different values in javaWAP to initialize different objects with different values in java
WAP to initialize different objects with different values in java
 

Último

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 

Último (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 

Topology

  • 1. Topology  Topology is physical or logical arrangement of computer. The physical topology of a network refers to the configuration of cables, computers, and other peripherals.  Physical topology should not be confused with logical topology which is the method used to pass information between workstations.  It is the geometric representation of the relationship of all the links and linking devices i.e. nodes to each other. Depending on the need of an organization different arrangements of computers are available.
  • 2. Types of Topologies Mesh Topology Star Topology Tree Topology Bus Topology Ring Topology
  • 3. Mesh Topology In mesh topology each node is connected to every other node by direct links. For n nodes , there would be n(n-1)/2 physical links. To accommodate that many links, every device on the network must have n-1 input/output ports. Every device has dedicated point to point link to every other device.
  • 4. Disadvantage • The use of dedicated links will increase the number of input/output ports. • Installation and reconfiguration are difficult in this topology. • The hardware required to connect each other can be prohibitively expensive. • The cable length is much more in this topology comparing to other.
  • 5. Advantages • The use of dedicated links guaranteed that each connection can carry its own data. • The Mesh topology does not have traffic congestion problems. • Point to point links make fault identification and fault isolation easy in this topology. • It is also robust in nature. Of one link is down, all the rest of the network can still continue. • When every message sent travels along dedicated line, only intended recipient sees it. Physical boundaries prevent other users from gaining access to messages, so we can say that there is data security.
  • 6. Star Topology • As we know that mesh topology have major drawback of cabling that has been overcome here in star topology with a special network device that is HUB. • In star topology, each device has a dedicated point to point link hub. The devices are not directly linked to each other. • A star topology does not allow direct traffic between devices. There devices can only communicate via the hub.
  • 7. Advantages • It is less expensive than mesh topology. • Each device needs only one link and one input port to connect it to any number of other. • It is easy to install and reconfigure. • Less cabling is required. • Moves and deletion involves only connection between the device and the hub. • Robustness i.e. if one link fails, only that link is affected and so helps in easy fault identification and fault isolation. • Hub is used to monitor link problems and by pass defective links.
  • 8. Disadvantages • Two terminals/devices can’t interact directly i.e. they have to go via central controller hub. This leads to no privacy in the network. • The network’s dependence on the main computer is more i.e. if the central computer (HUB) breaks down the entire network stops functioning.
  • 9. Tree Topology • The tree topology is a variation of a star. The tree topology requires the computer to be linked in a hierarchical way. • Nodes in a tree are linked to a central hub that controls the traffic to the network. • Not every device plugs directly into the central hub. the majority of devices connect to a secondary hub that in turn is connected to the central hub. • A central hub in the tree is an active hub. An active hub contains a repeater.
  • 10. Tree Topology • Repeater is a hardware device that regenerates the received bit patterns before sending them out. • The secondary hubs may be active or passive hubs. • A passive hub provides a simple physical connection between the attached devices. • The packets carrying the addresses of the destination nodes should have the complete address i.e. all the nodes above in the hierarchy must also have to be mentioned.
  • 11. Advantages • Point to point wiring for individual segments. • Supported by several hardware and software vendors.
  • 12. Disadvantages • Overall length of each segment is limited by the type of cabling used. • Id the backbone line breaks, the entire segment goes down. • More difficult to configure and wire than other topologies.
  • 13. Bus Topology • A linear bus topology consists of a main run of cable with a terminator at each end. • All nodes are connected to the linear cable. • Ethernet and Local Talk Networks use a linear bus topology. • This topology is a multipoint configuration. One long cable acts as backbone to link all the devices in the network. All nodes are connected to bus that runs through the network.
  • 14. Bus Topology • Drop line is a connection running between the device an the main cable. • A tap is a connector that either splices into the main cable. • As a signal travels along the backbone, some of its energy is transformed into heat. • Signal becomes weaker and weaker when farther it has to travel. • There is a limit on the number of taps a bus can support depending on the distance between those taps.
  • 15. Advantages • Easy to install. Easy to connect a computer or peripheral to linear bus. Requires less cable length. • Backbone cable can be laid along the most efficient path, then connected to the nodes by drop line of various length. • Only the backbone cable stretches through the entire facility. Each drop line has to reach only as far as the nearest point on the backbone.
  • 16. Disadvantages • Entire network shuts down if there is a break in the main cable. • Terminators are required at both ends of the backbone cable. • Difficult to identify the problem if the entire network shuts down. • Not meant to be used as a stand alone solution in a large building.
  • 17. Ring Topology • In a ring topology, each device has dedicated point to point line configuration only with two devices on either side or it. • A signal is passed along the ring in one direction from device to device until it reaches its destination. • Each device in the ring incorporates a repeater. When a device receives a signal intended for another device. • To connect n devices in a ring topology we need n cable links.
  • 18. Advantages • A ring is relatively easy to install and reconfigure, each device is linked only to its immediate neighbours. • To add or delete a device requires moving only two connections. The only constraints are media and traffic considerations. • Fault isolation is simplifies. In a ring a signal is circulating at all times. If one device does not receive a signal within a specified period. It can issue an alarm. The alarm alerts the network operator of the problem and its locations.
  • 19. Disadvantages • Supports unidirectional traffic. • In a simple ring, a break in the ring can disable the entire network. This weakness can be solved by using dual ring.