SlideShare a Scribd company logo
1 of 63
Network topologies and
access methods - Agenda
 5 min Warm up Essential Question brain storm
 15 min Introduction teacher demonstrate
 10 min Act1 – ppt teacher demonstrate
 5 min Act2 - listen to Lan video then asking questions
 10 min Students are connecting LAN between 2 laptops
 10 min Act3 - teacher demonstrate “Network Operating Software”
 10 min Act4 – network access methods
 2 +3 min Act5 - listen to access methods video then
asking questions
 10 min Reflection
 Home work Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School1
Essential Questions:
you were asked to create
network between your
school labs ,identify how
will you plan to do this
task?
Eng.Osama Ghandour Programming and electronics Teacher
Assiut STEM School2
How could to know about network
topologies and access methods?
 Example Movie
makerAsk or call a
college
Ask a
teacher
Ask or call an
expert or an
engineer
Search through search
engine such as google
or Bing for ppt or pdf
files using your laptop
or smart phone through
internet connection
Use the help / F1
Search through
YouTube
Search through wiki
Beddia
Activity 2
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School3
CS.2.07 Brain storm 5 min
Essential Questions:
What are the kinds
of networks ?
15-4
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School
5
biomimicry
computer
network
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School
Geographically
LAN
WAN
MAN
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School6
Introduction teacher demonstrate
Topology 15 min
 The physical topology of a network refers to the
configuration of cables, computers and other
peripherals.
 The main types of network topologies are:
– Linear Bus
– Star
– Ring
– Tree or Hybrid
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School7
Linear Bus topology
 A linear bus topology consists of a main run of cable with a
terminator at each end. All servers workstations and
peripherals are connected to the linear cable , a bus
technology called Ethernet has become the
industry standard for local-area networks.
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School8
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School9
Advantages & Disadvantages of Bus Topology
Advantages
 Works well for small networks
 Relatively inexpensive to implement
 Easy to add to it
Disadvantages
 Management costs can be high
 Potential for congestion with network trafficEng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School10
Star topology
 A star network is
designed with each
node (file server,
workstation,
peripheral) connected
directly to a central
network hub or server
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School11
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School12
Advantages & Disadvantages of Star Topology
Advantages
 Good option for modern networks
 Low startup costs
 Easy to manage
 Offers opportunities for expansion
 Most popular topology in use; wide variety of
equipment available
Disadvantages
 Hub is a single point of failure
 Requires more cable than the bus
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School13
Ring topology
 A ring network is one
where all workstations
and other devices are
connected in a
continuous loop. There
is no central server
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School14
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School15
Advantages of Ring Topology
 Easier to manage; easier to locate a
defective node or cable problem
 Well-suited for transmitting signals over
long distances on a LAN
 Handles high-volume network traffic
 Enables reliable communication
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School16
Disadvantages of
Ring Topology
 Expensive
 Requires more cable and network
equipment at the start
 Not used as widely as bus topology
– Fewer equipment options
– Fewer options for expansion to high-
speed communication
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School17
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School18
Tree or hybrid topology
 A tree or hybrid
topology combines
characteristics of linear
bus and star and/or
ring topologies.
 It consists of groups of
star-configured
workstations connected
to a linear bus
backbone cable
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School19
Star-Wired Bus
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School20
Star-bus-Topology - Star-
ring Topology
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School21
(CSMA/CD)
 Explain the principles of
networking, describe types of
networks, explain basic
networking concepts and
technologies, describe the
physical components of a network.
 describe network topologies,
Identify Ethernet standards
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School22
15 min Act1 – TPS
-Searching about Network
topologies
-Students print A3 and A4
papers about Network
topologies then stick it at the
class room walls Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School23
Daisy chain: linked series of devices
– Hubs and switches often connected in daisy
chain to extend a network
Hubs, gateways, routers, switches, and
bridges can form part of backbone
Extent to which hubs can be connected is
limited
Backbone Networks: Serial
Backbone
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School24
10 min Act3 - teacher demonstrate
“Network Operating Software”
 Network operating systems co-
ordinate the activities of
multiple computers across a
network
 The two major types of
network OS are:
– Peer-to-peer
– Client/server
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School25
Peer to peer network OS
– In peer to peer network OS, there is no
file server or central management source;
all computers are considered equal
– Peer to peer networks are design
primarily for small to medium LANS
– AppleShare and Windows
for Workgroups are examples of
programs that can function as peer to
peer
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School26
Client/Server network OS
– Client/server network OS centralise
functions and applications in one or
more dedicated file servers.
– The file server provides access to
resources and provides security
– Novel Netware and
Windows NT Server
are examples of
client/server network
operating systems
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School27
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School28
Now students
Concentrate to PPT
demonstration about
network models stopping
it then asking questions
10 m press here
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School29
Activity using laptops
Concentrate to PPT about
LAN between 2 laptops using
UTP
cable then asking questions
10 m press here
Network Flow of data / Computer
network access methods
 The Function of Access Methods
The set of rules that defines how a
computer puts data onto the network
cable and takes data from the cable is
called an access method. Once data is
moving on the network, access
methods help to regulate the flow of
10 min Act4 – network access methods
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School30
 Traffic Control on the Cable
A network is in some ways like a
railroad track, along which several trains
run. The track is interspersed with
occasional railway stations. When a
train is on the track, all other trains must
abide by a procedure that governs how
and when they enter the flow of traffic.
Without such a procedure, entering
trains would collide with the one already
on the track. Train pictures
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School31
What are important
differences between
a railroad system
and a computer
network?. Train pictures
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School32
Network Flow of data / computer
network access methods
– Carrier-sense multiple-access
with collision detection
(CSMA/CD)
– Carrier-sense multiple-access with
collision avoidance (CSMA/CA)
– Token passing Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School33
2 min Act5 - listen
to access methods
video then asking
questions press here
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School34
 Carrier-sense multiple-access with
collision detection (CSMA/CD)
Collision occurs if two computers put
data on the cable at the same time35
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School
 Access methods
prevent computers from
gaining simultaneous
access to the cable. By
making sure that only
one computer at a time
can put data on the
network cable, access
methods ensure that
the sending and
receiving of network
data is an orderly
process.
Computers can
transmit data only if
the cable is freeEng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School36
‫لى‬ ‫انت‬ ‫دا‬ ‫بى‬ ‫حس‬
‫حاجة‬ ‫كل‬
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School37
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School38
With these points in mind, the name of
the access method—carrier-sense
multiple access with collision detection
(CSMA/CD)—makes sense. Computers
listen to or "sense" the cable (carrier-
sense). Commonly, many computers on
the network attempt to transmit data
(multiple access); each one first listens to
detect any possible collisions. If a
computer detects a possible collision, it
waits for a random period of time before
retransmitting (collision detection).39
CSMA/CD is known as a contention method because
computers on the network contend, or compete, for an
opportunity to send data
 CSMA/CD Considerations
 The more computers there are on the network, the
more network traffic there will be. With more traffic,
collision avoidance and collisions tend to increase,
which slows the network down, so CSMA/CD can be a
slow-access method. Ex. journal exams
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School40
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School41
 After each collision, both computers will have to try to
retransmit their data. If the network is very busy, there
is a chance that the attempts by both computers will
result in collisions with packets from other computers
on the network. If this happens, four computers (the two
original computers and the two computers whose
transmitted packets collided with the original
computer's retransmitted packets) will have to attempt
to retransmit. These proliferating retransmissions can
slow the network to a near standstill.
 The occurrence of this problem depends on the number
of users attempting to use the network and which
applications they are using. Database applications tend
to put more traffic on the network than word-processing
applications do. Ex journal exams42
 Depending on the hardware components, the cabling,
and the networking software, using a CSMA/CD
network with many users running several database
applications can be very frustrating because of heavy
network traffic. Ex journal exams
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School43
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School44
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School45
2 min Act5 - listen
to Token ring
access method
video then asking
questions press hereEng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School46
Token-Passing Access Method
 In the access method known as token passing, a
special type of packet, called a token, circulates around
a cable ring from computer to computer. When any
computer on the ring needs to send data across the
network, it must wait for a free token. When a free
token is detected, the computer will take control of it if
the computer has data to send.
The computer can now transmit data. Data is transmitted
in frames, and additional information, such as addressing,
is attached to the frame in the form of headers and
trailers
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School47
 While the token is in use by one computer, other
computers cannot transmit data. Because only one
computer at a time can use the token, no contention
and no collision take place, and no time is spent waiting
for computers to resend tokens due to network traffic
on the cable.
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School48
 Demand Priority Access Method
 Demand priority is a relatively new access method
designed for the 100-Mbps Ethernet standard known as
100VG-AnyLAN. It has been sanctioned and
standardized by the Institute of Electrical and Electronic
Engineers (IEEE) in its 802.12 specification, which is
discussed later in this chapter.
 This access method is based on the fact that repeaters and end
nodes are the two components that make up all 100VG-AnyLAN
networks. Figure 3.4 shows a demand-priority network. The
repeaters manage network access by doing round-robin
searches for requests to send from all nodes on the network. The
repeater, or hub, is responsible for noting all addresses, links,
and end nodes and verifying that they are all functioning.
According to the 100VG-AnyLAN definition, an end node can be
a computer, bridge, router, or switch.49
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School50
 Demand-Priority Contention
 As in CSMA/CD, two computers using the demand-
priority access method can cause contention by
transmitting at exactly the same time. However, with
demand priority, it is possible to implement a scheme in
which certain types of data will be given priority if there
is contention. If the hub or repeater receives two
requests at the same time, the highest priority request
is serviced first. If the two requests are of the same
priority, both requests are serviced by alternating
between the two.
 In a demand-priority network, computers can receive and
transmit at the same time because of the cabling scheme defined
for this access method. In this method, four pairs of wires are
used, which enables quartet signaling, transmitting 25 MHz
signals on each of the pairs of wire in the cable.
51
 Demand priority offers several advantages over
CSMA/CD including:
 The use of four pairs of wires.
 By using four pairs of wires, computers can transmit
and receive at the same time.
 Transmissions through the hub.
 Transmissions are not broadcast to all the other
computers on the network. The computers do not
contend on their own for access to the cable, but
operate under the centralized control of the hub.
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School52
Feature or
function
CSMA/CD CSMA/CA Token passing
Demand
priority
Type of
Communicatio
n
Broadcast-
based
Broadcast-
based
Token-based Hub-based
Type of access
method
Contention Contention Noncontention Contention
Type of
network
Ethernet LocalTalk Token Ring
ArcNet
100VG-
AnyLan
Table 3.1 Features of Different Access Methods
53
 Managing data on a network is a form of traffic control.
 The set of rules that governs how network traffic is controlled is
called the access method.
 When using the CSMA/CD access method, a computer waits
until the network is quiet and then transmits its data. If two
computers transmit at the same time, the data will collide and
have to be re-sent. If two data packets collide, both will be
destroyed.
 When using the CSMA/CA access method, a computer transmits
its intent to transmit before actually sending the data.
 When using the token-ring access method, each computer must
wait to receive the token before it can transmit data. Only one
computer at a time can use the token.
 When using the demand-priority access method, each computer
communicates only with a hub. The hub then controls the flow of
data.
Access methods summary
54
Ethernet is a
Network Operating Software
Bus topology
Network access method
Backbone Networks ’element
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School55
INCORRECT!!!
Try Again Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School56
CORRECT
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School57
CCNA
Certified Computer Network
Administrator
this Certificate from Cisco company
www.netacade.com
Eng.Osama Ghandour Programming and
electronics Teacher Assiut STEM
School
Exam costs 3000 L.E. in
CISCO centers
But through online
exam is free of charge
58
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School59
Closing and summery
Network topologies
HybridBus StarRing
Network OS
AppleShare and Windows
Novel Netware and Windows NT
Client/server
Peer-to-peer
Network access methods
(CSMA/CD) - (CSMA/CA)
Token passing - Demand priority
5 min Reflection
• Mansion one type of each of :
• network topologies
• network OS
• network access methods ?
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School60
Home work
provides a summary
comparison between
network types , its OS
and its access data
methods in a tabel . Computer-Networks-
-Introduction_Computer_Networking pdf file Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School61
Journal Question
 In computer Science (CS.2.08), you
learned about different network
Topologies. What kind of these
network Topologies would you
suggest for a new factory
working in the field of the
industry you are working on for
this semester Capstone? Explain
why you suggested this kind?
62
https://twitter.com/osamageris
https://www.linkedin.com/in/osamaghandour/
https://www.youtube.com/user/osmgg2
https://www.facebook.com/osama.g.geris
Eng.Osama Ghandour
Programming and electronics
Teacher
Assiut STEM School63

More Related Content

Similar to 2020 network topologies and access methods

topological computer networks and access methods
topological computer networks and access methods topological computer networks and access methods
topological computer networks and access methods Osama Ghandour Geris
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheHansa Edirisinghe
 
CN_lecture1.ppt
CN_lecture1.pptCN_lecture1.ppt
CN_lecture1.pptrajucs
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networksKumailImran1
 
lecture1_computer_networks_Introduction.ppt
lecture1_computer_networks_Introduction.pptlecture1_computer_networks_Introduction.ppt
lecture1_computer_networks_Introduction.pptSATHYANARAYANAKB
 
1. Ch # 02 1st year computer science notes
1. Ch # 02 1st year computer science notes1. Ch # 02 1st year computer science notes
1. Ch # 02 1st year computer science notesmuhammadFaheem656405
 
Unit-1 intro to communication networks
Unit-1 intro to communication networksUnit-1 intro to communication networks
Unit-1 intro to communication networksSSGMCE SHEGAON
 
uniti-lecture1-9-140329213708-phpapp02.pdf
uniti-lecture1-9-140329213708-phpapp02.pdfuniti-lecture1-9-140329213708-phpapp02.pdf
uniti-lecture1-9-140329213708-phpapp02.pdfThnhNguynVn97
 
Types of Network Architecture
Types of Network ArchitectureTypes of Network Architecture
Types of Network Architecturesabari Giri
 
NETWORK TOPOLOGIES.pptx
NETWORK TOPOLOGIES.pptxNETWORK TOPOLOGIES.pptx
NETWORK TOPOLOGIES.pptxSaiKanna14
 
Computer Network Topology By Team_Diversity Detectives (Dept . of Sociology)
Computer Network Topology By Team_Diversity Detectives (Dept . of Sociology)Computer Network Topology By Team_Diversity Detectives (Dept . of Sociology)
Computer Network Topology By Team_Diversity Detectives (Dept . of Sociology)Suman Mia
 
INTRODUCTION TO Computer Network .ppt
INTRODUCTION TO Computer Network .pptINTRODUCTION TO Computer Network .ppt
INTRODUCTION TO Computer Network .pptutkarshlodhi4
 
Data Communications and Net-Centric computing
Data Communications and Net-Centric computingData Communications and Net-Centric computing
Data Communications and Net-Centric computingKomalah Nair
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORKiqbalrahman
 

Similar to 2020 network topologies and access methods (20)

topological computer networks and access methods
topological computer networks and access methods topological computer networks and access methods
topological computer networks and access methods
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
 
CN_lecture1.ppt
CN_lecture1.pptCN_lecture1.ppt
CN_lecture1.ppt
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
lecture1_computer_networks_Introduction.ppt
lecture1_computer_networks_Introduction.pptlecture1_computer_networks_Introduction.ppt
lecture1_computer_networks_Introduction.ppt
 
1. Ch # 02 1st year computer science notes
1. Ch # 02 1st year computer science notes1. Ch # 02 1st year computer science notes
1. Ch # 02 1st year computer science notes
 
Unit-1 intro to communication networks
Unit-1 intro to communication networksUnit-1 intro to communication networks
Unit-1 intro to communication networks
 
uniti-lecture1-9-140329213708-phpapp02.pdf
uniti-lecture1-9-140329213708-phpapp02.pdfuniti-lecture1-9-140329213708-phpapp02.pdf
uniti-lecture1-9-140329213708-phpapp02.pdf
 
Topologies
TopologiesTopologies
Topologies
 
networking
networking networking
networking
 
Types of Network Architecture
Types of Network ArchitectureTypes of Network Architecture
Types of Network Architecture
 
Ie20303week1
Ie20303week1Ie20303week1
Ie20303week1
 
NETWORK TOPOLOGIES.pptx
NETWORK TOPOLOGIES.pptxNETWORK TOPOLOGIES.pptx
NETWORK TOPOLOGIES.pptx
 
Network topology
Network topologyNetwork topology
Network topology
 
Computer Network Topology By Team_Diversity Detectives (Dept . of Sociology)
Computer Network Topology By Team_Diversity Detectives (Dept . of Sociology)Computer Network Topology By Team_Diversity Detectives (Dept . of Sociology)
Computer Network Topology By Team_Diversity Detectives (Dept . of Sociology)
 
INTRODUCTION TO Computer Network .ppt
INTRODUCTION TO Computer Network .pptINTRODUCTION TO Computer Network .ppt
INTRODUCTION TO Computer Network .ppt
 
Data Communications and Net-Centric computing
Data Communications and Net-Centric computingData Communications and Net-Centric computing
Data Communications and Net-Centric computing
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
 

More from Osama Ghandour Geris

functions in python By Eng. Osama Ghandour الدوال فى البايثون مع مهندس اسامه ...
functions in python By Eng. Osama Ghandour الدوال فى البايثون مع مهندس اسامه ...functions in python By Eng. Osama Ghandour الدوال فى البايثون مع مهندس اسامه ...
functions in python By Eng. Osama Ghandour الدوال فى البايثون مع مهندس اسامه ...Osama Ghandour Geris
 
Python week 5 2019-2020 for G10 by Eng.Osama Ghandour.ppt
Python week 5 2019-2020 for G10 by Eng.Osama Ghandour.pptPython week 5 2019-2020 for G10 by Eng.Osama Ghandour.ppt
Python week 5 2019-2020 for G10 by Eng.Osama Ghandour.pptOsama Ghandour Geris
 
Python cs.1.12 week 10 2020 2021 covid 19 for g10 by eng.osama mansour
Python cs.1.12 week 10  2020 2021 covid 19 for g10 by eng.osama mansourPython cs.1.12 week 10  2020 2021 covid 19 for g10 by eng.osama mansour
Python cs.1.12 week 10 2020 2021 covid 19 for g10 by eng.osama mansourOsama Ghandour Geris
 
Python cs.1.12 week 9 10 2020-2021 covid 19 for g10 by eng.osama ghandour
Python cs.1.12 week 9 10  2020-2021 covid 19 for g10 by eng.osama ghandourPython cs.1.12 week 9 10  2020-2021 covid 19 for g10 by eng.osama ghandour
Python cs.1.12 week 9 10 2020-2021 covid 19 for g10 by eng.osama ghandourOsama Ghandour Geris
 
Python week 7 8 2019-2020 for grade 10
Python week 7 8 2019-2020 for grade 10Python week 7 8 2019-2020 for grade 10
Python week 7 8 2019-2020 for grade 10Osama Ghandour Geris
 
Python week 6 2019 2020 for grade 10
Python week 6 2019 2020 for grade 10 Python week 6 2019 2020 for grade 10
Python week 6 2019 2020 for grade 10 Osama Ghandour Geris
 
Python week 5 2019 2020 for g10 by eng.osama ghandour
Python week 5 2019 2020 for g10 by eng.osama ghandourPython week 5 2019 2020 for g10 by eng.osama ghandour
Python week 5 2019 2020 for g10 by eng.osama ghandourOsama Ghandour Geris
 
Python week 4 2019 2020 for g10 by eng.osama ghandour
Python week 4 2019 2020 for g10 by eng.osama ghandourPython week 4 2019 2020 for g10 by eng.osama ghandour
Python week 4 2019 2020 for g10 by eng.osama ghandourOsama Ghandour Geris
 
Programming intro variables constants - arithmetic and assignment operators
Programming intro variables   constants - arithmetic and assignment operatorsProgramming intro variables   constants - arithmetic and assignment operators
Programming intro variables constants - arithmetic and assignment operatorsOsama Ghandour Geris
 
Mobile appliaction w android week 1 by osama
Mobile appliaction w android week 1 by osamaMobile appliaction w android week 1 by osama
Mobile appliaction w android week 1 by osamaOsama Ghandour Geris
 
Css week11 2020 2021 for g10 by eng.osama ghandour
Css week11 2020 2021 for g10 by eng.osama ghandourCss week11 2020 2021 for g10 by eng.osama ghandour
Css week11 2020 2021 for g10 by eng.osama ghandourOsama Ghandour Geris
 
How to print a sketch up drawing in 3d
How to print a sketch up drawing  in 3dHow to print a sketch up drawing  in 3d
How to print a sketch up drawing in 3dOsama Ghandour Geris
 
7 types of presentation styles on line
7 types of presentation styles on line7 types of presentation styles on line
7 types of presentation styles on lineOsama Ghandour Geris
 
Design pseudo codeweek 6 2019 -2020
Design pseudo codeweek 6 2019 -2020Design pseudo codeweek 6 2019 -2020
Design pseudo codeweek 6 2019 -2020Osama Ghandour Geris
 

More from Osama Ghandour Geris (20)

functions in python By Eng. Osama Ghandour الدوال فى البايثون مع مهندس اسامه ...
functions in python By Eng. Osama Ghandour الدوال فى البايثون مع مهندس اسامه ...functions in python By Eng. Osama Ghandour الدوال فى البايثون مع مهندس اسامه ...
functions in python By Eng. Osama Ghandour الدوال فى البايثون مع مهندس اسامه ...
 
Python week 5 2019-2020 for G10 by Eng.Osama Ghandour.ppt
Python week 5 2019-2020 for G10 by Eng.Osama Ghandour.pptPython week 5 2019-2020 for G10 by Eng.Osama Ghandour.ppt
Python week 5 2019-2020 for G10 by Eng.Osama Ghandour.ppt
 
Python cs.1.12 week 10 2020 2021 covid 19 for g10 by eng.osama mansour
Python cs.1.12 week 10  2020 2021 covid 19 for g10 by eng.osama mansourPython cs.1.12 week 10  2020 2021 covid 19 for g10 by eng.osama mansour
Python cs.1.12 week 10 2020 2021 covid 19 for g10 by eng.osama mansour
 
Python cs.1.12 week 9 10 2020-2021 covid 19 for g10 by eng.osama ghandour
Python cs.1.12 week 9 10  2020-2021 covid 19 for g10 by eng.osama ghandourPython cs.1.12 week 9 10  2020-2021 covid 19 for g10 by eng.osama ghandour
Python cs.1.12 week 9 10 2020-2021 covid 19 for g10 by eng.osama ghandour
 
Python week 7 8 2019-2020 for grade 10
Python week 7 8 2019-2020 for grade 10Python week 7 8 2019-2020 for grade 10
Python week 7 8 2019-2020 for grade 10
 
Python week 6 2019 2020 for grade 10
Python week 6 2019 2020 for grade 10 Python week 6 2019 2020 for grade 10
Python week 6 2019 2020 for grade 10
 
Python week 5 2019 2020 for g10 by eng.osama ghandour
Python week 5 2019 2020 for g10 by eng.osama ghandourPython week 5 2019 2020 for g10 by eng.osama ghandour
Python week 5 2019 2020 for g10 by eng.osama ghandour
 
Python week 4 2019 2020 for g10 by eng.osama ghandour
Python week 4 2019 2020 for g10 by eng.osama ghandourPython week 4 2019 2020 for g10 by eng.osama ghandour
Python week 4 2019 2020 for g10 by eng.osama ghandour
 
Programming intro variables constants - arithmetic and assignment operators
Programming intro variables   constants - arithmetic and assignment operatorsProgramming intro variables   constants - arithmetic and assignment operators
Programming intro variables constants - arithmetic and assignment operators
 
Mobile appliaction w android week 1 by osama
Mobile appliaction w android week 1 by osamaMobile appliaction w android week 1 by osama
Mobile appliaction w android week 1 by osama
 
Python week 1 2020-2021
Python week 1 2020-2021Python week 1 2020-2021
Python week 1 2020-2021
 
6 css week12 2020 2021 for g10
6 css week12 2020 2021 for g106 css week12 2020 2021 for g10
6 css week12 2020 2021 for g10
 
Css week11 2020 2021 for g10 by eng.osama ghandour
Css week11 2020 2021 for g10 by eng.osama ghandourCss week11 2020 2021 for g10 by eng.osama ghandour
Css week11 2020 2021 for g10 by eng.osama ghandour
 
Cooding history
Cooding history Cooding history
Cooding history
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
How to print a sketch up drawing in 3d
How to print a sketch up drawing  in 3dHow to print a sketch up drawing  in 3d
How to print a sketch up drawing in 3d
 
Google sketch up-tutorial
Google sketch up-tutorialGoogle sketch up-tutorial
Google sketch up-tutorial
 
7 types of presentation styles on line
7 types of presentation styles on line7 types of presentation styles on line
7 types of presentation styles on line
 
Design pseudo codeweek 6 2019 -2020
Design pseudo codeweek 6 2019 -2020Design pseudo codeweek 6 2019 -2020
Design pseudo codeweek 6 2019 -2020
 
Php introduction
Php introductionPhp introduction
Php introduction
 

Recently uploaded

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Recently uploaded (20)

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

2020 network topologies and access methods

  • 1. Network topologies and access methods - Agenda  5 min Warm up Essential Question brain storm  15 min Introduction teacher demonstrate  10 min Act1 – ppt teacher demonstrate  5 min Act2 - listen to Lan video then asking questions  10 min Students are connecting LAN between 2 laptops  10 min Act3 - teacher demonstrate “Network Operating Software”  10 min Act4 – network access methods  2 +3 min Act5 - listen to access methods video then asking questions  10 min Reflection  Home work Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School1
  • 2. Essential Questions: you were asked to create network between your school labs ,identify how will you plan to do this task? Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School2
  • 3. How could to know about network topologies and access methods?  Example Movie makerAsk or call a college Ask a teacher Ask or call an expert or an engineer Search through search engine such as google or Bing for ppt or pdf files using your laptop or smart phone through internet connection Use the help / F1 Search through YouTube Search through wiki Beddia Activity 2 Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School3
  • 4. CS.2.07 Brain storm 5 min Essential Questions: What are the kinds of networks ? 15-4 Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School
  • 7. Introduction teacher demonstrate Topology 15 min  The physical topology of a network refers to the configuration of cables, computers and other peripherals.  The main types of network topologies are: – Linear Bus – Star – Ring – Tree or Hybrid Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School7
  • 8. Linear Bus topology  A linear bus topology consists of a main run of cable with a terminator at each end. All servers workstations and peripherals are connected to the linear cable , a bus technology called Ethernet has become the industry standard for local-area networks. Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School8
  • 9. Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School9
  • 10. Advantages & Disadvantages of Bus Topology Advantages  Works well for small networks  Relatively inexpensive to implement  Easy to add to it Disadvantages  Management costs can be high  Potential for congestion with network trafficEng.Osama Ghandour Programming and electronics Teacher Assiut STEM School10
  • 11. Star topology  A star network is designed with each node (file server, workstation, peripheral) connected directly to a central network hub or server Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School11
  • 12. Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School12
  • 13. Advantages & Disadvantages of Star Topology Advantages  Good option for modern networks  Low startup costs  Easy to manage  Offers opportunities for expansion  Most popular topology in use; wide variety of equipment available Disadvantages  Hub is a single point of failure  Requires more cable than the bus Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School13
  • 14. Ring topology  A ring network is one where all workstations and other devices are connected in a continuous loop. There is no central server Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School14
  • 15. Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School15
  • 16. Advantages of Ring Topology  Easier to manage; easier to locate a defective node or cable problem  Well-suited for transmitting signals over long distances on a LAN  Handles high-volume network traffic  Enables reliable communication Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School16
  • 17. Disadvantages of Ring Topology  Expensive  Requires more cable and network equipment at the start  Not used as widely as bus topology – Fewer equipment options – Fewer options for expansion to high- speed communication Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School17
  • 18. Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School18
  • 19. Tree or hybrid topology  A tree or hybrid topology combines characteristics of linear bus and star and/or ring topologies.  It consists of groups of star-configured workstations connected to a linear bus backbone cable Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School19
  • 20. Star-Wired Bus Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School20
  • 21. Star-bus-Topology - Star- ring Topology Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School21 (CSMA/CD)
  • 22.  Explain the principles of networking, describe types of networks, explain basic networking concepts and technologies, describe the physical components of a network.  describe network topologies, Identify Ethernet standards Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School22
  • 23. 15 min Act1 – TPS -Searching about Network topologies -Students print A3 and A4 papers about Network topologies then stick it at the class room walls Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School23
  • 24. Daisy chain: linked series of devices – Hubs and switches often connected in daisy chain to extend a network Hubs, gateways, routers, switches, and bridges can form part of backbone Extent to which hubs can be connected is limited Backbone Networks: Serial Backbone Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School24
  • 25. 10 min Act3 - teacher demonstrate “Network Operating Software”  Network operating systems co- ordinate the activities of multiple computers across a network  The two major types of network OS are: – Peer-to-peer – Client/server Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School25
  • 26. Peer to peer network OS – In peer to peer network OS, there is no file server or central management source; all computers are considered equal – Peer to peer networks are design primarily for small to medium LANS – AppleShare and Windows for Workgroups are examples of programs that can function as peer to peer Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School26
  • 27. Client/Server network OS – Client/server network OS centralise functions and applications in one or more dedicated file servers. – The file server provides access to resources and provides security – Novel Netware and Windows NT Server are examples of client/server network operating systems Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School27
  • 28. Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School28 Now students Concentrate to PPT demonstration about network models stopping it then asking questions 10 m press here
  • 29. Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School29 Activity using laptops Concentrate to PPT about LAN between 2 laptops using UTP cable then asking questions 10 m press here
  • 30. Network Flow of data / Computer network access methods  The Function of Access Methods The set of rules that defines how a computer puts data onto the network cable and takes data from the cable is called an access method. Once data is moving on the network, access methods help to regulate the flow of 10 min Act4 – network access methods Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School30
  • 31.  Traffic Control on the Cable A network is in some ways like a railroad track, along which several trains run. The track is interspersed with occasional railway stations. When a train is on the track, all other trains must abide by a procedure that governs how and when they enter the flow of traffic. Without such a procedure, entering trains would collide with the one already on the track. Train pictures Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School31
  • 32. What are important differences between a railroad system and a computer network?. Train pictures Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School32
  • 33. Network Flow of data / computer network access methods – Carrier-sense multiple-access with collision detection (CSMA/CD) – Carrier-sense multiple-access with collision avoidance (CSMA/CA) – Token passing Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School33
  • 34. 2 min Act5 - listen to access methods video then asking questions press here Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School34
  • 35.  Carrier-sense multiple-access with collision detection (CSMA/CD) Collision occurs if two computers put data on the cable at the same time35 Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School
  • 36.  Access methods prevent computers from gaining simultaneous access to the cable. By making sure that only one computer at a time can put data on the network cable, access methods ensure that the sending and receiving of network data is an orderly process. Computers can transmit data only if the cable is freeEng.Osama Ghandour Programming and electronics Teacher Assiut STEM School36
  • 37. ‫لى‬ ‫انت‬ ‫دا‬ ‫بى‬ ‫حس‬ ‫حاجة‬ ‫كل‬ Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School37
  • 38. Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School38
  • 39. With these points in mind, the name of the access method—carrier-sense multiple access with collision detection (CSMA/CD)—makes sense. Computers listen to or "sense" the cable (carrier- sense). Commonly, many computers on the network attempt to transmit data (multiple access); each one first listens to detect any possible collisions. If a computer detects a possible collision, it waits for a random period of time before retransmitting (collision detection).39
  • 40. CSMA/CD is known as a contention method because computers on the network contend, or compete, for an opportunity to send data  CSMA/CD Considerations  The more computers there are on the network, the more network traffic there will be. With more traffic, collision avoidance and collisions tend to increase, which slows the network down, so CSMA/CD can be a slow-access method. Ex. journal exams Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School40
  • 41. Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School41
  • 42.  After each collision, both computers will have to try to retransmit their data. If the network is very busy, there is a chance that the attempts by both computers will result in collisions with packets from other computers on the network. If this happens, four computers (the two original computers and the two computers whose transmitted packets collided with the original computer's retransmitted packets) will have to attempt to retransmit. These proliferating retransmissions can slow the network to a near standstill.  The occurrence of this problem depends on the number of users attempting to use the network and which applications they are using. Database applications tend to put more traffic on the network than word-processing applications do. Ex journal exams42
  • 43.  Depending on the hardware components, the cabling, and the networking software, using a CSMA/CD network with many users running several database applications can be very frustrating because of heavy network traffic. Ex journal exams Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School43
  • 44. Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School44
  • 45. Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School45
  • 46. 2 min Act5 - listen to Token ring access method video then asking questions press hereEng.Osama Ghandour Programming and electronics Teacher Assiut STEM School46
  • 47. Token-Passing Access Method  In the access method known as token passing, a special type of packet, called a token, circulates around a cable ring from computer to computer. When any computer on the ring needs to send data across the network, it must wait for a free token. When a free token is detected, the computer will take control of it if the computer has data to send. The computer can now transmit data. Data is transmitted in frames, and additional information, such as addressing, is attached to the frame in the form of headers and trailers Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School47
  • 48.  While the token is in use by one computer, other computers cannot transmit data. Because only one computer at a time can use the token, no contention and no collision take place, and no time is spent waiting for computers to resend tokens due to network traffic on the cable. Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School48
  • 49.  Demand Priority Access Method  Demand priority is a relatively new access method designed for the 100-Mbps Ethernet standard known as 100VG-AnyLAN. It has been sanctioned and standardized by the Institute of Electrical and Electronic Engineers (IEEE) in its 802.12 specification, which is discussed later in this chapter.  This access method is based on the fact that repeaters and end nodes are the two components that make up all 100VG-AnyLAN networks. Figure 3.4 shows a demand-priority network. The repeaters manage network access by doing round-robin searches for requests to send from all nodes on the network. The repeater, or hub, is responsible for noting all addresses, links, and end nodes and verifying that they are all functioning. According to the 100VG-AnyLAN definition, an end node can be a computer, bridge, router, or switch.49
  • 50. Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School50
  • 51.  Demand-Priority Contention  As in CSMA/CD, two computers using the demand- priority access method can cause contention by transmitting at exactly the same time. However, with demand priority, it is possible to implement a scheme in which certain types of data will be given priority if there is contention. If the hub or repeater receives two requests at the same time, the highest priority request is serviced first. If the two requests are of the same priority, both requests are serviced by alternating between the two.  In a demand-priority network, computers can receive and transmit at the same time because of the cabling scheme defined for this access method. In this method, four pairs of wires are used, which enables quartet signaling, transmitting 25 MHz signals on each of the pairs of wire in the cable. 51
  • 52.  Demand priority offers several advantages over CSMA/CD including:  The use of four pairs of wires.  By using four pairs of wires, computers can transmit and receive at the same time.  Transmissions through the hub.  Transmissions are not broadcast to all the other computers on the network. The computers do not contend on their own for access to the cable, but operate under the centralized control of the hub. Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School52
  • 53. Feature or function CSMA/CD CSMA/CA Token passing Demand priority Type of Communicatio n Broadcast- based Broadcast- based Token-based Hub-based Type of access method Contention Contention Noncontention Contention Type of network Ethernet LocalTalk Token Ring ArcNet 100VG- AnyLan Table 3.1 Features of Different Access Methods 53
  • 54.  Managing data on a network is a form of traffic control.  The set of rules that governs how network traffic is controlled is called the access method.  When using the CSMA/CD access method, a computer waits until the network is quiet and then transmits its data. If two computers transmit at the same time, the data will collide and have to be re-sent. If two data packets collide, both will be destroyed.  When using the CSMA/CA access method, a computer transmits its intent to transmit before actually sending the data.  When using the token-ring access method, each computer must wait to receive the token before it can transmit data. Only one computer at a time can use the token.  When using the demand-priority access method, each computer communicates only with a hub. The hub then controls the flow of data. Access methods summary 54
  • 55. Ethernet is a Network Operating Software Bus topology Network access method Backbone Networks ’element Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School55
  • 56. INCORRECT!!! Try Again Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School56
  • 57. CORRECT Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School57
  • 58. CCNA Certified Computer Network Administrator this Certificate from Cisco company www.netacade.com Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School Exam costs 3000 L.E. in CISCO centers But through online exam is free of charge 58
  • 59. Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School59 Closing and summery Network topologies HybridBus StarRing Network OS AppleShare and Windows Novel Netware and Windows NT Client/server Peer-to-peer Network access methods (CSMA/CD) - (CSMA/CA) Token passing - Demand priority
  • 60. 5 min Reflection • Mansion one type of each of : • network topologies • network OS • network access methods ? Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School60
  • 61. Home work provides a summary comparison between network types , its OS and its access data methods in a tabel . Computer-Networks- -Introduction_Computer_Networking pdf file Eng.Osama Ghandour Programming and electronics Teacher Assiut STEM School61
  • 62. Journal Question  In computer Science (CS.2.08), you learned about different network Topologies. What kind of these network Topologies would you suggest for a new factory working in the field of the industry you are working on for this semester Capstone? Explain why you suggested this kind? 62