SlideShare a Scribd company logo
1 of 15
Types of
network and
topologies
Arjun Katiyar
• A computer network is telecommunications network that allows
computer to exchange data.
• The physical connection between network computing devices is
established using either cable media or wireless media.
• The best known computer network is the internet.
Bases on the size and coverage area, network are characterized
in following types
• Personal area network (PAN)
• Local area network (LAN)
• Metropolitan area network (MAN)
• Wide area network (WAN)
Personal area network, or PAN, is a computer network that enables communication
between computer devices near a person.
• A personal area network (PAN) is a computer network used for communication among
computer and different information technological devices close to one person.
• A pan may include wired and wireless devices.
• The reach of a pan typically extends to 10 meters.
A local area network (LAN) is a collection of devices connected
together in one physical location, such as a building, office, or
home.
A local area network (LAN) is a network that connects
computers and devices in a limited geographical area such as
a home, school, office building, or closely positioned group of
buildings.
• Each computer or device on the network is a node.
• Wired LANs are most likely based on Ethernet technology.
A metropolitan area network (MAN) is a computer network
that connects computers within a metropolitan area, which
could be a single large city, multiple cities and towns, or any
given large area with multiple buildings.
• It is relatively larger than LAN and extends across city or a
metropolitan.
• It is created by connecting two or more LANs located at
different locations in a city.
A wide-area network is a computer network that connects
smaller networks.
• A wide area network (WAN) is a computer network that
covers a large geographic area such as a city, country, or
spans even intercontinental distances.
• A WAN uses a communications channel that combines
many types of media such as telephone lines, cables, and
air waves.
• A WAN often makes use of transmission facilities provided
by common carriers, such as telephone companies.
The arrangement of a network that comprises nodes and connecting lines via sender and
receiver is referred to as network topology.
A Network Topology is the arrangement with which computer systems or network devices
are connected to each other. Topologies may define both physical and logical aspect of the
network. Both logical and physical topologies could be same or different in a same network
• Bus Topology.
• Ring Topology.
• Star Topology.
• Mesh Topology.
• Tree Topology.
All devices share single communication line
or cable. Bus topology may have problem
while multiple hosts sending data at the
same time.
In ring topology, each host machine
connects to exactly two other machines,
creating a circular network structure.
All hosts in Star topology are connected to
a central device, known as hub device,
using a point-to-point connection.
In this type of topology, a host is connected
to one or multiple hosts.This topology has
hosts in point-to-point connection with every
other host or may also have hosts which are
in point-to-point connection to few hosts only.
Also known as Hierarchical Topology, this
is the most common form of network
topology in use presently. This topology
imitates as extended Star topology and
inherits properties of bus topology.
Main benefits of networks include:
File sharing - you can easily share data between different users, or access it remotely if you
keep it on other connected devices.
Resource sharing - using network-connected peripheral devices like printers, scanners and
copiers, or sharing software between multiple users, saves money.
Sharing a single internet connection - it is cost-efficient and can help protect your systems if
you properly secure the network.
Increasing storage capacity - you can access files and multimedia, such as images and music,
which you store remotely on other machines or network-attached storage devices.

More Related Content

What's hot

1 presentation copy
1 presentation   copy1 presentation   copy
1 presentation copyNikhil Mace
 
Types of computer network ...
Types of computer network ...Types of computer network ...
Types of computer network ...shahbaz ahmad
 
PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.satyamjipatel
 
Computer Network & Types
Computer Network & TypesComputer Network & Types
Computer Network & TypesShefa Idrees
 
Computer network system (2)
Computer network system (2)Computer network system (2)
Computer network system (2)hanirahman16
 
Communication through computer networks
Communication through computer networksCommunication through computer networks
Communication through computer networksIvin Sebastian
 
Lecture 1 an introduction to computer networks
Lecture 1  an introduction to computer networksLecture 1  an introduction to computer networks
Lecture 1 an introduction to computer networksAmitava Nag
 
Different types of network
Different types of networkDifferent types of network
Different types of networkAryan Saxena
 
Ccna presentation
Ccna presentationCcna presentation
Ccna presentationpuneet4321
 
Classification computer network
Classification computer networkClassification computer network
Classification computer networkMH Shihab
 
Computer communication and internet
Computer communication and internetComputer communication and internet
Computer communication and interneteVidhya
 
Computer Networks - PPT
Computer Networks - PPTComputer Networks - PPT
Computer Networks - PPTDhivya T
 
Computer networking For Class XII
Computer networking For Class XIIComputer networking For Class XII
Computer networking For Class XIIFernando Torres
 

What's hot (20)

1 presentation copy
1 presentation   copy1 presentation   copy
1 presentation copy
 
Types of computer network ...
Types of computer network ...Types of computer network ...
Types of computer network ...
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
 
Network
NetworkNetwork
Network
 
Computer network
Computer network Computer network
Computer network
 
PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.
 
Computer-Networks
Computer-NetworksComputer-Networks
Computer-Networks
 
Computer Network & Types
Computer Network & TypesComputer Network & Types
Computer Network & Types
 
Computer network system (2)
Computer network system (2)Computer network system (2)
Computer network system (2)
 
Communication through computer networks
Communication through computer networksCommunication through computer networks
Communication through computer networks
 
Lecture 1 an introduction to computer networks
Lecture 1  an introduction to computer networksLecture 1  an introduction to computer networks
Lecture 1 an introduction to computer networks
 
Different types of network
Different types of networkDifferent types of network
Different types of network
 
Ccna presentation
Ccna presentationCcna presentation
Ccna presentation
 
Networking
NetworkingNetworking
Networking
 
Classification computer network
Classification computer networkClassification computer network
Classification computer network
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
 
Computer communication and internet
Computer communication and internetComputer communication and internet
Computer communication and internet
 
Computer Networks - PPT
Computer Networks - PPTComputer Networks - PPT
Computer Networks - PPT
 
Lan manwan
Lan manwanLan manwan
Lan manwan
 
Computer networking For Class XII
Computer networking For Class XIIComputer networking For Class XII
Computer networking For Class XII
 

Similar to Network

Similar to Network (20)

network.pdf
network.pdfnetwork.pdf
network.pdf
 
COMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptxCOMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptx
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
 
Computer Networks .ppt
Computer Networks .pptComputer Networks .ppt
Computer Networks .ppt
 
Computer Networks 1 .ppt
Computer Networks 1 .pptComputer Networks 1 .ppt
Computer Networks 1 .ppt
 
Networks
NetworksNetworks
Networks
 
Computer network
Computer networkComputer network
Computer network
 
Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)
 
Presentation-10.pptx
Presentation-10.pptxPresentation-10.pptx
Presentation-10.pptx
 
Basics of Computer Network
Basics of Computer NetworkBasics of Computer Network
Basics of Computer Network
 
Computer Networking.pptx
Computer Networking.pptxComputer Networking.pptx
Computer Networking.pptx
 
info technology.pptx
info technology.pptxinfo technology.pptx
info technology.pptx
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKING
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
Computer Network Introduction full
Computer Network Introduction fullComputer Network Introduction full
Computer Network Introduction full
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Networking
NetworkingNetworking
Networking
 
Networking ppt by swapi
Networking ppt by swapi Networking ppt by swapi
Networking ppt by swapi
 
Computer: Network and its Topology
Computer: Network and its TopologyComputer: Network and its Topology
Computer: Network and its Topology
 
NETWORKING PPT
NETWORKING PPTNETWORKING PPT
NETWORKING PPT
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Network

  • 2. • A computer network is telecommunications network that allows computer to exchange data. • The physical connection between network computing devices is established using either cable media or wireless media. • The best known computer network is the internet.
  • 3. Bases on the size and coverage area, network are characterized in following types • Personal area network (PAN) • Local area network (LAN) • Metropolitan area network (MAN) • Wide area network (WAN)
  • 4. Personal area network, or PAN, is a computer network that enables communication between computer devices near a person. • A personal area network (PAN) is a computer network used for communication among computer and different information technological devices close to one person. • A pan may include wired and wireless devices. • The reach of a pan typically extends to 10 meters.
  • 5. A local area network (LAN) is a collection of devices connected together in one physical location, such as a building, office, or home. A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office building, or closely positioned group of buildings. • Each computer or device on the network is a node. • Wired LANs are most likely based on Ethernet technology.
  • 6. A metropolitan area network (MAN) is a computer network that connects computers within a metropolitan area, which could be a single large city, multiple cities and towns, or any given large area with multiple buildings. • It is relatively larger than LAN and extends across city or a metropolitan. • It is created by connecting two or more LANs located at different locations in a city.
  • 7. A wide-area network is a computer network that connects smaller networks. • A wide area network (WAN) is a computer network that covers a large geographic area such as a city, country, or spans even intercontinental distances. • A WAN uses a communications channel that combines many types of media such as telephone lines, cables, and air waves. • A WAN often makes use of transmission facilities provided by common carriers, such as telephone companies.
  • 8. The arrangement of a network that comprises nodes and connecting lines via sender and receiver is referred to as network topology. A Network Topology is the arrangement with which computer systems or network devices are connected to each other. Topologies may define both physical and logical aspect of the network. Both logical and physical topologies could be same or different in a same network
  • 9. • Bus Topology. • Ring Topology. • Star Topology. • Mesh Topology. • Tree Topology.
  • 10. All devices share single communication line or cable. Bus topology may have problem while multiple hosts sending data at the same time.
  • 11. In ring topology, each host machine connects to exactly two other machines, creating a circular network structure.
  • 12. All hosts in Star topology are connected to a central device, known as hub device, using a point-to-point connection.
  • 13. In this type of topology, a host is connected to one or multiple hosts.This topology has hosts in point-to-point connection with every other host or may also have hosts which are in point-to-point connection to few hosts only.
  • 14. Also known as Hierarchical Topology, this is the most common form of network topology in use presently. This topology imitates as extended Star topology and inherits properties of bus topology.
  • 15. Main benefits of networks include: File sharing - you can easily share data between different users, or access it remotely if you keep it on other connected devices. Resource sharing - using network-connected peripheral devices like printers, scanners and copiers, or sharing software between multiple users, saves money. Sharing a single internet connection - it is cost-efficient and can help protect your systems if you properly secure the network. Increasing storage capacity - you can access files and multimedia, such as images and music, which you store remotely on other machines or network-attached storage devices.