SlideShare a Scribd company logo
1 of 52
Network topology
Topology
 Topology refers to the layout of connected
devices on a network.
 Here, some logical layout of topology.
 Mesh
 Star
 Bus
 Ring
 Tree and Hybrid
Network Topology
Mesh Topology
 Here every device has a point to point link to
every other device.
 Node 1 node must be connected with n-1
nodes.
 A fully connected mesh can have n(n-1)/2
physical channels to link n devices.
 It must have n-1 I/O ports.
Mesh Topology
Advantages:
1. They use dedicated links so each link can only
carry its own data load. So traffic problem can be
avoided.
2. It is robust. If any one link get damaged it cannot
affect others.
3. It gives privacy and security.(Message travels
along a dedicated link)
4. Fault identification and fault isolation are easy.
Mesh Topology
Mesh Topology
Mesh Topology
 Disadvantages:
1. The amount of cabling and the number of I/O ports
required are very large. Since every device is
connected to each devices through dedicated links.
2. The bulk of wiring is larger then the available space.
3. Hardware required to connected each device is
highly expensive.
Mesh Topology
 Applications:
1. Telephone Regional office.
2. WAN.(Wide Area Network).
Star Topology
 Here each device has a dedicated point-to-point link to
the central controller called “Hub”(Act as a
Exchange).
 There is no direct traffic between devices.
 The transmission are occurred only through the
central “hub”.
 When device 1 wants to send data to device 2; First
sends the data to hub. Which then relays the data to
the other connected device.
Star Topology
Star Topology
Star Topology
 Advantages:
1. Less expensive then mesh since each device is
connected only to the hub.
2. Installation and configuration are easy.
3. Less cabling is need then mesh.
4. Robustness.(if one link fails, only that links is affected.
All other links remain active)
5. Easy to fault identification & to remove parts.
6. No distruptions to the network then connecting(or)
removing devices.
Star Topology
 Disadvantages:
1. Even it requires less cabling then mesh when
compared with other topologies it still large.(Ring or
bus).
2. Dependency(whole n/w dependent on one single
point(hub). When it goes down. The whole system is
dead.
Applications
 Star topology used in Local Area Networks(LANs).
 High speed LAN often used STAR.
Asynchronous Transfer Mode
 By the mid 1980s, three types of communication
networks had evolved.
 The telephone network carries voice calls, television
network carries video transmissions, and newly
emerging computer network carries data.
 Telephone companies realized that voice
communication was becoming a commodity service
and that the profit margin would decrease over time.
 They realized that data communication was
increasing.
 The telecommunication industry decided to expand its
business by developing networks to carry traffic other
than voice.
Asynchronous Transfer Mode (ATM) is a switching technique for
telecommunication networks. It uses asynchronous time-division
multiplexing,[1][2] and it encodes data into small, fixed-sized cells.
ATM differs from networks such as the Internet or Ethernet LANs that use variable
sized packets or frames. ATM provides data link layer services that run
over OSI Layer 1 physical links. ATM has functional similarity with
both circuit switched networking and small packet switched networking.
This makes it a good choice for a network that must handle both traditional high-
speed data traffic (e.g., file transfers), and real-time, low-latency content such as
voice and video.
Asynchronous Transfer Mode
ATM
 ATM standard is widely accepted by common
carriers as mode of operation for communication
– particularly BISDN.
 ATM is a form of cell switching using small fixed-
sized packets.
Header Payload
5 Bytes 48 Bytes
Figure 9.1
Basic ATM Cell Format
Leon-Garcia & Widjaja: Communication NetworksCopyright ©2000 The McGraw Hill Companies
ATM is more complex, but this complexity allows to give guarantees as to data
rate, maximum delay, and jitter.
These are usually called Quality of Service.
JITTER:
In voice over IP (VoIP), jitter is the variation in the time between packets
arriving, caused by network congestion, timing drift, or route changes. A jitter
buffer can be used to handle jitter.
Jitter is the deviation in or displacement of some aspect of the pulses in a high-
frequency digital signal.
Quality of Service or QoS is a method of providing better service for selected
traffic types over various types of packet-switched networks.
Advantages
 Universality
 Mixed traffic types, real-time and non-real-time
 Scalability
 LANs, MANs, WANs, WLANs
 Efficient use of network resources Bandwidth on
demand concept
 Simplified network infrastructure
Disadvantages
 ATM has not been widely accepted. Although some phone
companies still use it in their backbone networks.
 The expense, complexity and lack of interoperability with
other technologies have prevented ATM from becoming
more prevalent.
Disadvantages
 Complexity of QoS: The complexity of the specification
makes implementation cumbersome and difficult. Many
implementations do not support the full standard.
 Assumption of Homogeneity: ATM is designed to be a
single, universal networking system. There is minimal
provision for interoperating with other technologies
Bus Topology
 A bus topology is multipoint.
 Here one long cable act as a backbone to link all the
devices are connected to the backbone by drop lines
and taps.
 Drop line- is the connection b/w the devices and the
cable.
 Tap- is the splitter that cut the main link.
 This allows only one device to transmit at a time.
Bus Topology
Bus Topology
Bus Topology
Bus Topology
Bus Topology
 A device want to communicate with other device on
the n/ws sends a broadcast message onto the wire all
other devices see.
 But only the intended devices accepts and process the
message.
Bus Topology
 Advantages:
1. Ease of installation
2. Less cabling
Disadvantages:
1. Difficult reconfiguration and fault isolation.
2. Difficult to add new devices.
3. Signal reflection at top can degradation in quality.
4. If any fault in backbone can stops all transmission.
Bus Topology
 Applications:
 Most computer motherboard.
Ring Topology
 Here each device has a dedicated connection with two
devices on either side.
 The signal is passed in one direction from device to
device until it reaches the destination and each device
have repeater.
 When one device received signals instead of intended
another device, its repeater then regenerates the data
and passes them along.
 To add or delete a device requires changing only two
connections.
Ring Topology
Ring Topology
Ring Topology
Ring Topology
 Advantages:
1. Easy to install.
2. Easy to reconfigure.
3. Fault identification is easy.
Disadvantages:
1. Unidirectional traffic.
2. Break in a single ring can break entire network.
Ring Topology
 Applications:
 Ring topologies are found in some office buildings or
school campuses.
 Today high speed LANs made this topology less
popular.
 EX… IBM Token Ring,FDDI
• IBM created IEEE(Institute of Electrical and Electronics Engineers)
802.5 standard known as Token Ring
• it uses a special packet known as Token
• Multi-station Access Unit (MSAU)
 A Token Ring network is a local area network (LAN) in
which all computers are connected in a ring or star
topology and a bit- or token-passing scheme is used in
order to prevent the collision of data between two
computers that want to send messages at the same
time. The Token Ring protocol is the second most
widely-used protocol on local area networks after
Ethernet. The IBM Token Ring protocol led to a
standard version, specified as IEEE 802.5. Both
protocols are used and are very similar. The IEEE 802.5
Token Ring technology provides for data transfer rates
of either 4 or 16 megabits per second.
FDDI (Fiber Distributed Data
Interface)
 FDDI is a standard developed by the American
National Standards Institute (ANSI)
for transmitting data on optical fibers
Supports transmission rates of up to 200 Mbps
 Uses a dual ring
 First ring used to carry data at 100 Mbps
 Second ring used for primary backup in
case first ring fails
 If no backup is needed, second ring can
also carry data, increasing the data rate up to 200 Mbps
 Supports up to 1000 nodes
 Has a range of up to 200 km
 The possessor of the token is allowed to put a new token onto the ring as soon
as it finished transmitting its frames
Tree Topology
 Alternatively referred to as a star bus topology.
 Tree topology is one of the most common network
setups that is similar to a bus topology and a star
topology.
 A tree topology connects multiple star networks to
other star networks. Below is a visual example of a
simple computer setup on a network using the star
topology.
Tree Topology
Hybrid Topology
 A network which contain all type of physical structure
and connected under a single backbone channel.
Hybrid Topology
 a
Considerations for choosing
topology
 Money-Bus n/w may be the least expensive way to
install a n/w.
 Length-of cable needed- the linear bus n/w uses
shorter lengths of cable.
 Future growth-with star topology, expending a n/w is
easily done by adding another devices.
 Cable type-most common used cable in commercial
organization is twisted pair. Which often
used with star topologies.
 Full mesh topology is theoretically the best since
every device is connected to every other device.(thus
maximizing speed and security. however, it quite
expensive to install)
 Next best would be tree topology, which is basically a
connection of star.
• 1973 by Bob Metacalfe (IEEE standard called 802.3 CSMA/CD)
Ethernet Overview
 Most popular packet-switched LAN technology
 Bandwidths: 10Mbps, 100Mbps, 1Gbps
 Max bus length: 2500m
 500m segments with 4 repeaters
 Bus and Star topologies are used to connect hosts
 Hosts attach to network via Ethernet transceiver or hub or switch
 Detects line state and sends/receives signals
 Hubs are used to facilitate shared connections
 All hosts on an Ethernet are competing for access to the medium
 Switches break this model
 Problem: Distributed algorithm that provides fair access
 Ethernet by definition is a broadcast protocol
 Any signal can be received by all hosts
 Switching enables individual hosts to communicate
 Network layer packets are transmitted over an
Ethernet by encapsulating
 Frame Format
Dest
addr
64 48 32
CRCPreamble Src
addr
Type Body
1648
• a section of a network where data packets can collide with one
another when being sent on a shared medium
• the larger the collision domain, the more likely it is that collision
will occur
•Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the
protocol for carrier transmission access in Ethernet networks. On
Ethernet, any device can try to send a frame at any time. Each device
senses whether the line is idle and therefore available to be used. If it
is, the device begins to transmit its first frame. If another device has
tried to send at the same time, a collision is said to occur and the
frames are discarded. Each device then waits a random amount of
time and retries until successful in getting its transmission sent.
Intranet is system in which multiple PCs are connected to each other.
PCs in intranet are not available to the world outside the intranet.
Usually each company or organization has their own Intranet
network and members/employees of that company can access the
computers in their intranet.
Each computer in Intranet is also identified by an IP Address which is
unique among the computers in that Intranet.
Intranet
(HCL)
Intranet
(Wipro)Internet
Extranet

More Related Content

What's hot

Categorias de cable utp 1
Categorias de cable utp 1Categorias de cable utp 1
Categorias de cable utp 1laifran_berdugo
 
Introduction to Bluetooth Low Energy
Introduction to Bluetooth Low EnergyIntroduction to Bluetooth Low Energy
Introduction to Bluetooth Low EnergyNEEVEE Technologies
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniquestameemyousaf
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer networkmiteshppt
 
Detailed description about Hubs Switches Modems and their working
Detailed description about  Hubs Switches Modems and their workingDetailed description about  Hubs Switches Modems and their working
Detailed description about Hubs Switches Modems and their workingrockingprashik
 
Report on 4G - LTE
Report on 4G - LTEReport on 4G - LTE
Report on 4G - LTERahul Ghai
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSNMahbubur Rahman
 
Ad-Hoc Wireless Network
Ad-Hoc Wireless NetworkAd-Hoc Wireless Network
Ad-Hoc Wireless Networkmdfarhanh1
 
Different protocols for data communication networks
Different protocols for data communication networks Different protocols for data communication networks
Different protocols for data communication networks Nt Arvind
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingArunChokkalingam
 
Local area network
Local area networkLocal area network
Local area networkSEDYK
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 

What's hot (20)

Categorias de cable utp 1
Categorias de cable utp 1Categorias de cable utp 1
Categorias de cable utp 1
 
OSI Layer
OSI LayerOSI Layer
OSI Layer
 
Introduction to Bluetooth Low Energy
Introduction to Bluetooth Low EnergyIntroduction to Bluetooth Low Energy
Introduction to Bluetooth Low Energy
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniques
 
Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET) Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET)
 
Ethernet - LAN
Ethernet - LANEthernet - LAN
Ethernet - LAN
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Detailed description about Hubs Switches Modems and their working
Detailed description about  Hubs Switches Modems and their workingDetailed description about  Hubs Switches Modems and their working
Detailed description about Hubs Switches Modems and their working
 
Report on 4G - LTE
Report on 4G - LTEReport on 4G - LTE
Report on 4G - LTE
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
Ethernet
EthernetEthernet
Ethernet
 
Physical Layer
Physical LayerPhysical Layer
Physical Layer
 
Ad-Hoc Wireless Network
Ad-Hoc Wireless NetworkAd-Hoc Wireless Network
Ad-Hoc Wireless Network
 
Different protocols for data communication networks
Different protocols for data communication networks Different protocols for data communication networks
Different protocols for data communication networks
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient Routing
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
Network cables
Network cablesNetwork cables
Network cables
 
Local area network
Local area networkLocal area network
Local area network
 
Networking devices
Networking devicesNetworking devices
Networking devices
 

Viewers also liked

Network topologies
Network topologiesNetwork topologies
Network topologiesNorah Saad
 
Presentatie Pieter Dillingh
Presentatie Pieter DillinghPresentatie Pieter Dillingh
Presentatie Pieter DillinghEuropadialoog
 
Presentatie Kris Magnus
Presentatie Kris MagnusPresentatie Kris Magnus
Presentatie Kris MagnusEuropadialoog
 
Overcoming investor objection - Peter Garnham (Accelerate 2014 - Sheffield)
Overcoming investor objection - Peter Garnham (Accelerate 2014 - Sheffield)Overcoming investor objection - Peter Garnham (Accelerate 2014 - Sheffield)
Overcoming investor objection - Peter Garnham (Accelerate 2014 - Sheffield)Christopher Hill
 
Valentine's Day Activities
Valentine's Day ActivitiesValentine's Day Activities
Valentine's Day ActivitiesLynn Scotty
 
Presentatie Andy Klom
Presentatie Andy KlomPresentatie Andy Klom
Presentatie Andy KlomEuropadialoog
 
Presentatie Marijke van Hees
Presentatie Marijke van HeesPresentatie Marijke van Hees
Presentatie Marijke van HeesEuropadialoog
 
Accelerate from Social Entrepreneurs
Accelerate from Social Entrepreneurs Accelerate from Social Entrepreneurs
Accelerate from Social Entrepreneurs Christopher Hill
 
Film marketing
Film marketingFilm marketing
Film marketingAFG-Girl07
 
Presentatie Jeroen Smits
Presentatie Jeroen SmitsPresentatie Jeroen Smits
Presentatie Jeroen SmitsEuropadialoog
 
Presentatie Jitty van Doodewaerd
Presentatie Jitty van DoodewaerdPresentatie Jitty van Doodewaerd
Presentatie Jitty van DoodewaerdEuropadialoog
 
In Hurricane Season a Sump Pump is Key
In Hurricane Season a Sump Pump is KeyIn Hurricane Season a Sump Pump is Key
In Hurricane Season a Sump Pump is KeyTsurumiPumpSales.com
 

Viewers also liked (19)

Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 
Unit 1 ethernet vsd
Unit 1 ethernet vsdUnit 1 ethernet vsd
Unit 1 ethernet vsd
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
ASAMBLEA OCTUBRE
ASAMBLEA OCTUBREASAMBLEA OCTUBRE
ASAMBLEA OCTUBRE
 
Presentatie Pieter Dillingh
Presentatie Pieter DillinghPresentatie Pieter Dillingh
Presentatie Pieter Dillingh
 
Presentatie Kris Magnus
Presentatie Kris MagnusPresentatie Kris Magnus
Presentatie Kris Magnus
 
Overcoming investor objection - Peter Garnham (Accelerate 2014 - Sheffield)
Overcoming investor objection - Peter Garnham (Accelerate 2014 - Sheffield)Overcoming investor objection - Peter Garnham (Accelerate 2014 - Sheffield)
Overcoming investor objection - Peter Garnham (Accelerate 2014 - Sheffield)
 
Batería de palabras
Batería de palabrasBatería de palabras
Batería de palabras
 
Valentine's Day Activities
Valentine's Day ActivitiesValentine's Day Activities
Valentine's Day Activities
 
Presentatie Andy Klom
Presentatie Andy KlomPresentatie Andy Klom
Presentatie Andy Klom
 
Presentatie Marijke van Hees
Presentatie Marijke van HeesPresentatie Marijke van Hees
Presentatie Marijke van Hees
 
Accelerate from Social Entrepreneurs
Accelerate from Social Entrepreneurs Accelerate from Social Entrepreneurs
Accelerate from Social Entrepreneurs
 
Film marketing
Film marketingFilm marketing
Film marketing
 
Presentatie Jeroen Smits
Presentatie Jeroen SmitsPresentatie Jeroen Smits
Presentatie Jeroen Smits
 
Presentatie Jitty van Doodewaerd
Presentatie Jitty van DoodewaerdPresentatie Jitty van Doodewaerd
Presentatie Jitty van Doodewaerd
 
Global VPN
Global VPNGlobal VPN
Global VPN
 
Judge dredd
Judge dreddJudge dredd
Judge dredd
 
In Hurricane Season a Sump Pump is Key
In Hurricane Season a Sump Pump is KeyIn Hurricane Season a Sump Pump is Key
In Hurricane Season a Sump Pump is Key
 
Reflexiones
ReflexionesReflexiones
Reflexiones
 

Similar to 7 topology ethernet

Classification of Computer
Classification of ComputerClassification of Computer
Classification of ComputerAfsanaAkterRubi
 
Ccna(routing &and switching)
Ccna(routing &and switching)Ccna(routing &and switching)
Ccna(routing &and switching)Shweta Kumari
 
Network using topologies
Network using topologiesNetwork using topologies
Network using topologiesJaveria600
 
Open Elective MSE.pptx
Open Elective MSE.pptxOpen Elective MSE.pptx
Open Elective MSE.pptxathars248
 
basic networking
basic networkingbasic networking
basic networkingAnmol Bagga
 
lecture 2,3.pdf
lecture 2,3.pdflecture 2,3.pdf
lecture 2,3.pdfuseless45
 
NFPhysical Layer.pptx
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptxmmmm11111
 
CN-UNIT-1 09.01.23.ppt
CN-UNIT-1 09.01.23.pptCN-UNIT-1 09.01.23.ppt
CN-UNIT-1 09.01.23.pptjayapal385
 
Computer Network ssss ppt.pptx
Computer Network ssss ppt.pptxComputer Network ssss ppt.pptx
Computer Network ssss ppt.pptxRamNivas42
 
Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01Sayyed Nawaz
 
Chapter 1 - Network Topologies.pptx
Chapter 1 - Network Topologies.pptxChapter 1 - Network Topologies.pptx
Chapter 1 - Network Topologies.pptxNaeemAkhtar403523
 
CN Unit 1 part 1 2023.ppt
CN Unit 1 part 1 2023.pptCN Unit 1 part 1 2023.ppt
CN Unit 1 part 1 2023.pptmohanravi1986
 
Network ppt
Network pptNetwork ppt
Network ppthlalu861
 

Similar to 7 topology ethernet (20)

3.pptx
3.pptx3.pptx
3.pptx
 
Classification of Computer
Classification of ComputerClassification of Computer
Classification of Computer
 
original
originaloriginal
original
 
networking
networkingnetworking
networking
 
Lesson 8
Lesson 8Lesson 8
Lesson 8
 
Ccna(routing &and switching)
Ccna(routing &and switching)Ccna(routing &and switching)
Ccna(routing &and switching)
 
Network using topologies
Network using topologiesNetwork using topologies
Network using topologies
 
Open Elective MSE.pptx
Open Elective MSE.pptxOpen Elective MSE.pptx
Open Elective MSE.pptx
 
basic networking
basic networkingbasic networking
basic networking
 
Arvind Singh
Arvind SinghArvind Singh
Arvind Singh
 
lecture 2,3.pdf
lecture 2,3.pdflecture 2,3.pdf
lecture 2,3.pdf
 
NFPhysical Layer.pptx
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptx
 
CN-UNIT-1 09.01.23.ppt
CN-UNIT-1 09.01.23.pptCN-UNIT-1 09.01.23.ppt
CN-UNIT-1 09.01.23.ppt
 
CN UNIT1 TO UNIT 5.pdf
CN UNIT1 TO UNIT 5.pdfCN UNIT1 TO UNIT 5.pdf
CN UNIT1 TO UNIT 5.pdf
 
Computer Network ssss ppt.pptx
Computer Network ssss ppt.pptxComputer Network ssss ppt.pptx
Computer Network ssss ppt.pptx
 
Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01
 
Chapter 1 - Network Topologies.pptx
Chapter 1 - Network Topologies.pptxChapter 1 - Network Topologies.pptx
Chapter 1 - Network Topologies.pptx
 
Networking notes2
Networking notes2Networking notes2
Networking notes2
 
CN Unit 1 part 1 2023.ppt
CN Unit 1 part 1 2023.pptCN Unit 1 part 1 2023.ppt
CN Unit 1 part 1 2023.ppt
 
Network ppt
Network pptNetwork ppt
Network ppt
 

More from Samit Singh

mis structure.pptx
mis structure.pptxmis structure.pptx
mis structure.pptxSamit Singh
 
5 transmission media
5 transmission media5 transmission media
5 transmission mediaSamit Singh
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level Samit Singh
 

More from Samit Singh (6)

mis structure.pptx
mis structure.pptxmis structure.pptx
mis structure.pptx
 
6 ip
6 ip6 ip
6 ip
 
1 network intro
1 network intro1 network intro
1 network intro
 
5 transmission media
5 transmission media5 transmission media
5 transmission media
 
3 lan man wan
3 lan man wan3 lan man wan
3 lan man wan
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
 

Recently uploaded

ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxruthvilladarez
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 

Recently uploaded (20)

ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 

7 topology ethernet

  • 2. Topology  Topology refers to the layout of connected devices on a network.  Here, some logical layout of topology.  Mesh  Star  Bus  Ring  Tree and Hybrid
  • 4. Mesh Topology  Here every device has a point to point link to every other device.  Node 1 node must be connected with n-1 nodes.  A fully connected mesh can have n(n-1)/2 physical channels to link n devices.  It must have n-1 I/O ports.
  • 5. Mesh Topology Advantages: 1. They use dedicated links so each link can only carry its own data load. So traffic problem can be avoided. 2. It is robust. If any one link get damaged it cannot affect others. 3. It gives privacy and security.(Message travels along a dedicated link) 4. Fault identification and fault isolation are easy.
  • 8. Mesh Topology  Disadvantages: 1. The amount of cabling and the number of I/O ports required are very large. Since every device is connected to each devices through dedicated links. 2. The bulk of wiring is larger then the available space. 3. Hardware required to connected each device is highly expensive.
  • 9. Mesh Topology  Applications: 1. Telephone Regional office. 2. WAN.(Wide Area Network).
  • 10. Star Topology  Here each device has a dedicated point-to-point link to the central controller called “Hub”(Act as a Exchange).  There is no direct traffic between devices.  The transmission are occurred only through the central “hub”.  When device 1 wants to send data to device 2; First sends the data to hub. Which then relays the data to the other connected device.
  • 13. Star Topology  Advantages: 1. Less expensive then mesh since each device is connected only to the hub. 2. Installation and configuration are easy. 3. Less cabling is need then mesh. 4. Robustness.(if one link fails, only that links is affected. All other links remain active) 5. Easy to fault identification & to remove parts. 6. No distruptions to the network then connecting(or) removing devices.
  • 14. Star Topology  Disadvantages: 1. Even it requires less cabling then mesh when compared with other topologies it still large.(Ring or bus). 2. Dependency(whole n/w dependent on one single point(hub). When it goes down. The whole system is dead.
  • 15. Applications  Star topology used in Local Area Networks(LANs).  High speed LAN often used STAR.
  • 16.
  • 17. Asynchronous Transfer Mode  By the mid 1980s, three types of communication networks had evolved.  The telephone network carries voice calls, television network carries video transmissions, and newly emerging computer network carries data.  Telephone companies realized that voice communication was becoming a commodity service and that the profit margin would decrease over time.  They realized that data communication was increasing.  The telecommunication industry decided to expand its business by developing networks to carry traffic other than voice.
  • 18. Asynchronous Transfer Mode (ATM) is a switching technique for telecommunication networks. It uses asynchronous time-division multiplexing,[1][2] and it encodes data into small, fixed-sized cells. ATM differs from networks such as the Internet or Ethernet LANs that use variable sized packets or frames. ATM provides data link layer services that run over OSI Layer 1 physical links. ATM has functional similarity with both circuit switched networking and small packet switched networking. This makes it a good choice for a network that must handle both traditional high- speed data traffic (e.g., file transfers), and real-time, low-latency content such as voice and video. Asynchronous Transfer Mode
  • 19. ATM  ATM standard is widely accepted by common carriers as mode of operation for communication – particularly BISDN.  ATM is a form of cell switching using small fixed- sized packets. Header Payload 5 Bytes 48 Bytes Figure 9.1 Basic ATM Cell Format Leon-Garcia & Widjaja: Communication NetworksCopyright ©2000 The McGraw Hill Companies
  • 20. ATM is more complex, but this complexity allows to give guarantees as to data rate, maximum delay, and jitter. These are usually called Quality of Service. JITTER: In voice over IP (VoIP), jitter is the variation in the time between packets arriving, caused by network congestion, timing drift, or route changes. A jitter buffer can be used to handle jitter. Jitter is the deviation in or displacement of some aspect of the pulses in a high- frequency digital signal. Quality of Service or QoS is a method of providing better service for selected traffic types over various types of packet-switched networks.
  • 21. Advantages  Universality  Mixed traffic types, real-time and non-real-time  Scalability  LANs, MANs, WANs, WLANs  Efficient use of network resources Bandwidth on demand concept  Simplified network infrastructure
  • 22. Disadvantages  ATM has not been widely accepted. Although some phone companies still use it in their backbone networks.  The expense, complexity and lack of interoperability with other technologies have prevented ATM from becoming more prevalent.
  • 23. Disadvantages  Complexity of QoS: The complexity of the specification makes implementation cumbersome and difficult. Many implementations do not support the full standard.  Assumption of Homogeneity: ATM is designed to be a single, universal networking system. There is minimal provision for interoperating with other technologies
  • 24. Bus Topology  A bus topology is multipoint.  Here one long cable act as a backbone to link all the devices are connected to the backbone by drop lines and taps.  Drop line- is the connection b/w the devices and the cable.  Tap- is the splitter that cut the main link.  This allows only one device to transmit at a time.
  • 29. Bus Topology  A device want to communicate with other device on the n/ws sends a broadcast message onto the wire all other devices see.  But only the intended devices accepts and process the message.
  • 30. Bus Topology  Advantages: 1. Ease of installation 2. Less cabling Disadvantages: 1. Difficult reconfiguration and fault isolation. 2. Difficult to add new devices. 3. Signal reflection at top can degradation in quality. 4. If any fault in backbone can stops all transmission.
  • 31. Bus Topology  Applications:  Most computer motherboard.
  • 32. Ring Topology  Here each device has a dedicated connection with two devices on either side.  The signal is passed in one direction from device to device until it reaches the destination and each device have repeater.  When one device received signals instead of intended another device, its repeater then regenerates the data and passes them along.  To add or delete a device requires changing only two connections.
  • 36. Ring Topology  Advantages: 1. Easy to install. 2. Easy to reconfigure. 3. Fault identification is easy. Disadvantages: 1. Unidirectional traffic. 2. Break in a single ring can break entire network.
  • 37. Ring Topology  Applications:  Ring topologies are found in some office buildings or school campuses.  Today high speed LANs made this topology less popular.  EX… IBM Token Ring,FDDI
  • 38. • IBM created IEEE(Institute of Electrical and Electronics Engineers) 802.5 standard known as Token Ring • it uses a special packet known as Token • Multi-station Access Unit (MSAU)
  • 39.  A Token Ring network is a local area network (LAN) in which all computers are connected in a ring or star topology and a bit- or token-passing scheme is used in order to prevent the collision of data between two computers that want to send messages at the same time. The Token Ring protocol is the second most widely-used protocol on local area networks after Ethernet. The IBM Token Ring protocol led to a standard version, specified as IEEE 802.5. Both protocols are used and are very similar. The IEEE 802.5 Token Ring technology provides for data transfer rates of either 4 or 16 megabits per second.
  • 40. FDDI (Fiber Distributed Data Interface)  FDDI is a standard developed by the American National Standards Institute (ANSI) for transmitting data on optical fibers Supports transmission rates of up to 200 Mbps  Uses a dual ring  First ring used to carry data at 100 Mbps  Second ring used for primary backup in case first ring fails  If no backup is needed, second ring can also carry data, increasing the data rate up to 200 Mbps  Supports up to 1000 nodes  Has a range of up to 200 km  The possessor of the token is allowed to put a new token onto the ring as soon as it finished transmitting its frames
  • 41. Tree Topology  Alternatively referred to as a star bus topology.  Tree topology is one of the most common network setups that is similar to a bus topology and a star topology.  A tree topology connects multiple star networks to other star networks. Below is a visual example of a simple computer setup on a network using the star topology.
  • 43. Hybrid Topology  A network which contain all type of physical structure and connected under a single backbone channel.
  • 45. Considerations for choosing topology  Money-Bus n/w may be the least expensive way to install a n/w.  Length-of cable needed- the linear bus n/w uses shorter lengths of cable.  Future growth-with star topology, expending a n/w is easily done by adding another devices.  Cable type-most common used cable in commercial organization is twisted pair. Which often used with star topologies.
  • 46.  Full mesh topology is theoretically the best since every device is connected to every other device.(thus maximizing speed and security. however, it quite expensive to install)  Next best would be tree topology, which is basically a connection of star.
  • 47. • 1973 by Bob Metacalfe (IEEE standard called 802.3 CSMA/CD)
  • 48. Ethernet Overview  Most popular packet-switched LAN technology  Bandwidths: 10Mbps, 100Mbps, 1Gbps  Max bus length: 2500m  500m segments with 4 repeaters  Bus and Star topologies are used to connect hosts  Hosts attach to network via Ethernet transceiver or hub or switch  Detects line state and sends/receives signals  Hubs are used to facilitate shared connections  All hosts on an Ethernet are competing for access to the medium  Switches break this model  Problem: Distributed algorithm that provides fair access
  • 49.  Ethernet by definition is a broadcast protocol  Any signal can be received by all hosts  Switching enables individual hosts to communicate  Network layer packets are transmitted over an Ethernet by encapsulating  Frame Format Dest addr 64 48 32 CRCPreamble Src addr Type Body 1648
  • 50. • a section of a network where data packets can collide with one another when being sent on a shared medium • the larger the collision domain, the more likely it is that collision will occur
  • 51. •Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the protocol for carrier transmission access in Ethernet networks. On Ethernet, any device can try to send a frame at any time. Each device senses whether the line is idle and therefore available to be used. If it is, the device begins to transmit its first frame. If another device has tried to send at the same time, a collision is said to occur and the frames are discarded. Each device then waits a random amount of time and retries until successful in getting its transmission sent.
  • 52. Intranet is system in which multiple PCs are connected to each other. PCs in intranet are not available to the world outside the intranet. Usually each company or organization has their own Intranet network and members/employees of that company can access the computers in their intranet. Each computer in Intranet is also identified by an IP Address which is unique among the computers in that Intranet. Intranet (HCL) Intranet (Wipro)Internet Extranet