SlideShare a Scribd company logo
1 of 11
Point to Point and
Daisy Chain
Topologies
BY AJAY A K
What is Point to Point topology
 Point-to-point topology is a type of network configuration in which each
device on the network is connected directly to one other device. This
means that there is only one path of communication between any two
devices on the network
Advantages
 Simplicity: Only two devices are connected, making it easy to set up and
troubleshoot.
 Dedicated link: A direct link is established between the two devices,
resulting in a dedicated connection with no contention from other devices.
 Scalability: Additional point-to-point links can be added as needed to
expand the network.
Disadvantages
 Limited expansion: Only two devices can be connected, making it difficult
to expand the network beyond that.
 Cost: Setting up point-to-point connections can be expensive, as
dedicated links are required for each connection.
 Single point of failure: If the link between the two devices fails, the entire
connection is lost, making the network vulnerable to downtime
What is Daisy chain topologies
 A Daisy chain topology is a network configuration where devices are
connected in a linear fashion, with each device connected to the one
before and after it. This creates a chain-like structure, with all devices
connected in series.
Daisy-chained network can
take two basic forms:
Linear Topology
Ring Topology
Linear Topology
 Linear bus topology is a type of network topology where each device
connects one after the other in a sequential chain (shown right). In this
case, the bus is the network connection between the devices
Ring Topology
 A ring topology is a network configuration where device connections
create a circular data path. Each networked device is connected to two
others, like points on a circle. Together, devices in a ring topology are
called a ring network.
Advantages
 Easy to install and configure: The linear structure of a daisy chain makes it
easy to set up and add new devices.
 Cost-effective: Only two connections are required for each device,
reducing the cost of cables and connectors.
 Scalability: Additional devices can be added to the chain as needed to
expand the network.
Disadvantages
 Single point of failure: If one device in the chain fails, the entire network
can be affected.
 Limited distance: The distance between devices is limited by the maximum
cable length and signal attenuation.
 Limited bandwidth: The overall bandwidth of the network is shared among
all devices, which can lead to slow performance.
THANK YOU

More Related Content

Similar to Point to point and Daisy chain topologies.pptx

Similar to Point to point and Daisy chain topologies.pptx (20)

Types of network topology
Types of network topologyTypes of network topology
Types of network topology
 
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
 
Different types of Topology
Different types of TopologyDifferent types of Topology
Different types of Topology
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14
 
Network Topology's
Network Topology'sNetwork Topology's
Network Topology's
 
Computer Network Topology By Team_Societal Explorers (Dept . of Sociology)
Computer Network Topology By Team_Societal Explorers (Dept . of Sociology)Computer Network Topology By Team_Societal Explorers (Dept . of Sociology)
Computer Network Topology By Team_Societal Explorers (Dept . of Sociology)
 
Network topology
Network topologyNetwork topology
Network topology
 
Topology
TopologyTopology
Topology
 
Network topology
Network topologyNetwork topology
Network topology
 
Lecture 03
Lecture 03Lecture 03
Lecture 03
 
Topology
Topology Topology
Topology
 
Network Topologies in computer networking
Network Topologies in computer networkingNetwork Topologies in computer networking
Network Topologies in computer networking
 
Topology
TopologyTopology
Topology
 
Types of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterTypes of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouter
 
network topology
network topologynetwork topology
network topology
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network topology
Network topologyNetwork topology
Network topology
 
Topology
TopologyTopology
Topology
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 

Recently uploaded

Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Lovely Professional University
 
1893-part-1-2016 for Earthquake load design
1893-part-1-2016 for Earthquake load design1893-part-1-2016 for Earthquake load design
1893-part-1-2016 for Earthquake load design
AshishSingh1301
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
Madan Karki
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdf
Kamal Acharya
 
Microkernel in Operating System | Operating System
Microkernel in Operating System | Operating SystemMicrokernel in Operating System | Operating System
Microkernel in Operating System | Operating System
Sampad Kar
 

Recently uploaded (20)

Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)
 
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdf
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2
 
1893-part-1-2016 for Earthquake load design
1893-part-1-2016 for Earthquake load design1893-part-1-2016 for Earthquake load design
1893-part-1-2016 for Earthquake load design
 
Vip ℂall Girls Karkardooma Phone No 9999965857 High Profile ℂall Girl Delhi N...
Vip ℂall Girls Karkardooma Phone No 9999965857 High Profile ℂall Girl Delhi N...Vip ℂall Girls Karkardooma Phone No 9999965857 High Profile ℂall Girl Delhi N...
Vip ℂall Girls Karkardooma Phone No 9999965857 High Profile ℂall Girl Delhi N...
 
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
 
Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AI
 
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTUUNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
 
The Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptxThe Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptx
 
Lab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxLab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docx
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdf
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdf
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
Multivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptxMultivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptx
 
Microkernel in Operating System | Operating System
Microkernel in Operating System | Operating SystemMicrokernel in Operating System | Operating System
Microkernel in Operating System | Operating System
 

Point to point and Daisy chain topologies.pptx

  • 1. Point to Point and Daisy Chain Topologies BY AJAY A K
  • 2. What is Point to Point topology  Point-to-point topology is a type of network configuration in which each device on the network is connected directly to one other device. This means that there is only one path of communication between any two devices on the network
  • 3. Advantages  Simplicity: Only two devices are connected, making it easy to set up and troubleshoot.  Dedicated link: A direct link is established between the two devices, resulting in a dedicated connection with no contention from other devices.  Scalability: Additional point-to-point links can be added as needed to expand the network.
  • 4. Disadvantages  Limited expansion: Only two devices can be connected, making it difficult to expand the network beyond that.  Cost: Setting up point-to-point connections can be expensive, as dedicated links are required for each connection.  Single point of failure: If the link between the two devices fails, the entire connection is lost, making the network vulnerable to downtime
  • 5. What is Daisy chain topologies  A Daisy chain topology is a network configuration where devices are connected in a linear fashion, with each device connected to the one before and after it. This creates a chain-like structure, with all devices connected in series.
  • 6. Daisy-chained network can take two basic forms: Linear Topology Ring Topology
  • 7. Linear Topology  Linear bus topology is a type of network topology where each device connects one after the other in a sequential chain (shown right). In this case, the bus is the network connection between the devices
  • 8. Ring Topology  A ring topology is a network configuration where device connections create a circular data path. Each networked device is connected to two others, like points on a circle. Together, devices in a ring topology are called a ring network.
  • 9. Advantages  Easy to install and configure: The linear structure of a daisy chain makes it easy to set up and add new devices.  Cost-effective: Only two connections are required for each device, reducing the cost of cables and connectors.  Scalability: Additional devices can be added to the chain as needed to expand the network.
  • 10. Disadvantages  Single point of failure: If one device in the chain fails, the entire network can be affected.  Limited distance: The distance between devices is limited by the maximum cable length and signal attenuation.  Limited bandwidth: The overall bandwidth of the network is shared among all devices, which can lead to slow performance.