SlideShare a Scribd company logo
1 of 52
Network topology
Topology
 Topology refers to the layout of connected
devices on a network.
 Here, some logical layout of topology.
 Mesh
 Star
 Bus
 Ring
 Tree and Hybrid
Network Topology
Mesh Topology
 Here every device has a point to point link to
every other device.
 Node 1 node must be connected with n-1
nodes.
 A fully connected mesh can have n(n-1)/2
physical channels to link n devices.
 It must have n-1 I/O ports.
Mesh Topology
Advantages:
1. They use dedicated links so each link can only
carry its own data load. So traffic problem can be
avoided.
2. It is robust. If any one link get damaged it cannot
affect others.
3. It gives privacy and security.(Message travels
along a dedicated link)
4. Fault identification and fault isolation are easy.
Mesh Topology
Mesh Topology
Mesh Topology
 Disadvantages:
1. The amount of cabling and the number of I/O ports
required are very large. Since every device is
connected to each devices through dedicated links.
2. The bulk of wiring is larger then the available space.
3. Hardware required to connected each device is
highly expensive.
Mesh Topology
 Applications:
1. Telephone Regional office.
2. WAN.(Wide Area Network).
Star Topology
 Here each device has a dedicated point-to-point link to
the central controller called “Hub”(Act as a
Exchange).
 There is no direct traffic between devices.
 The transmission are occurred only through the
central “hub”.
 When device 1 wants to send data to device 2; First
sends the data to hub. Which then relays the data to
the other connected device.
Star Topology
Star Topology
Star Topology
 Advantages:
1. Less expensive then mesh since each device is
connected only to the hub.
2. Installation and configuration are easy.
3. Less cabling is need then mesh.
4. Robustness.(if one link fails, only that links is affected.
All other links remain active)
5. Easy to fault identification & to remove parts.
6. No distruptions to the network then connecting(or)
removing devices.
Star Topology
 Disadvantages:
1. Even it requires less cabling then mesh when
compared with other topologies it still large.(Ring or
bus).
2. Dependency(whole n/w dependent on one single
point(hub). When it goes down. The whole system is
dead.
Applications
 Star topology used in Local Area Networks(LANs).
 High speed LAN often used STAR.
Asynchronous Transfer Mode
 By the mid 1980s, three types of communication
networks had evolved.
 The telephone network carries voice calls, television
network carries video transmissions, and newly
emerging computer network carries data.
 Telephone companies realized that voice
communication was becoming a commodity service
and that the profit margin would decrease over time.
 They realized that data communication was
increasing.
 The telecommunication industry decided to expand its
business by developing networks to carry traffic other
than voice.
Asynchronous Transfer Mode (ATM) is a switching technique for
telecommunication networks. It uses asynchronous time-division
multiplexing,[1][2] and it encodes data into small, fixed-sized cells.
ATM differs from networks such as the Internet or Ethernet LANs that use variable
sized packets or frames. ATM provides data link layer services that run
over OSI Layer 1 physical links. ATM has functional similarity with
both circuit switched networking and small packet switched networking.
This makes it a good choice for a network that must handle both traditional high-
speed data traffic (e.g., file transfers), and real-time, low-latency content such as
voice and video.
Asynchronous Transfer Mode
ATM
 ATM standard is widely accepted by common
carriers as mode of operation for communication
– particularly BISDN.
 ATM is a form of cell switching using small fixed-
sized packets.
Header Payload
5 Bytes 48 Bytes
Figure 9.1
Basic ATM Cell Format
Leon-Garcia & Widjaja: Communication NetworksCopyright ©2000 The McGraw Hill Companies
ATM is more complex, but this complexity allows to give guarantees as to data
rate, maximum delay, and jitter.
These are usually called Quality of Service.
JITTER:
In voice over IP (VoIP), jitter is the variation in the time between packets
arriving, caused by network congestion, timing drift, or route changes. A jitter
buffer can be used to handle jitter.
Jitter is the deviation in or displacement of some aspect of the pulses in a high-
frequency digital signal.
Quality of Service or QoS is a method of providing better service for selected
traffic types over various types of packet-switched networks.
Advantages
 Universality
 Mixed traffic types, real-time and non-real-time
 Scalability
 LANs, MANs, WANs, WLANs
 Efficient use of network resources Bandwidth on
demand concept
 Simplified network infrastructure
Disadvantages
 ATM has not been widely accepted. Although some phone
companies still use it in their backbone networks.
 The expense, complexity and lack of interoperability with
other technologies have prevented ATM from becoming
more prevalent.
Disadvantages
 Complexity of QoS: The complexity of the specification
makes implementation cumbersome and difficult. Many
implementations do not support the full standard.
 Assumption of Homogeneity: ATM is designed to be a
single, universal networking system. There is minimal
provision for interoperating with other technologies
Bus Topology
 A bus topology is multipoint.
 Here one long cable act as a backbone to link all the
devices are connected to the backbone by drop lines
and taps.
 Drop line- is the connection b/w the devices and the
cable.
 Tap- is the splitter that cut the main link.
 This allows only one device to transmit at a time.
Bus Topology
Bus Topology
Bus Topology
Bus Topology
Bus Topology
 A device want to communicate with other device on
the n/ws sends a broadcast message onto the wire all
other devices see.
 But only the intended devices accepts and process the
message.
Bus Topology
 Advantages:
1. Ease of installation
2. Less cabling
Disadvantages:
1. Difficult reconfiguration and fault isolation.
2. Difficult to add new devices.
3. Signal reflection at top can degradation in quality.
4. If any fault in backbone can stops all transmission.
Bus Topology
 Applications:
 Most computer motherboard.
Ring Topology
 Here each device has a dedicated connection with two
devices on either side.
 The signal is passed in one direction from device to
device until it reaches the destination and each device
have repeater.
 When one device received signals instead of intended
another device, its repeater then regenerates the data
and passes them along.
 To add or delete a device requires changing only two
connections.
Ring Topology
Ring Topology
Ring Topology
Ring Topology
 Advantages:
1. Easy to install.
2. Easy to reconfigure.
3. Fault identification is easy.
Disadvantages:
1. Unidirectional traffic.
2. Break in a single ring can break entire network.
Ring Topology
 Applications:
 Ring topologies are found in some office buildings or
school campuses.
 Today high speed LANs made this topology less
popular.
 EX… IBM Token Ring,FDDI
• IBM created IEEE(Institute of Electrical and Electronics Engineers)
802.5 standard known as Token Ring
• it uses a special packet known as Token
• Multi-station Access Unit (MSAU)
 A Token Ring network is a local area network (LAN) in
which all computers are connected in a ring or star
topology and a bit- or token-passing scheme is used in
order to prevent the collision of data between two
computers that want to send messages at the same
time. The Token Ring protocol is the second most
widely-used protocol on local area networks after
Ethernet. The IBM Token Ring protocol led to a
standard version, specified as IEEE 802.5. Both
protocols are used and are very similar. The IEEE 802.5
Token Ring technology provides for data transfer rates
of either 4 or 16 megabits per second.
FDDI (Fiber Distributed Data
Interface)
 FDDI is a standard developed by the American
National Standards Institute (ANSI)
for transmitting data on optical fibers
Supports transmission rates of up to 200 Mbps
 Uses a dual ring
 First ring used to carry data at 100 Mbps
 Second ring used for primary backup in
case first ring fails
 If no backup is needed, second ring can
also carry data, increasing the data rate up to 200 Mbps
 Supports up to 1000 nodes
 Has a range of up to 200 km
 The possessor of the token is allowed to put a new token onto the ring as soon
as it finished transmitting its frames
Tree Topology
 Alternatively referred to as a star bus topology.
 Tree topology is one of the most common network
setups that is similar to a bus topology and a star
topology.
 A tree topology connects multiple star networks to
other star networks. Below is a visual example of a
simple computer setup on a network using the star
topology.
Tree Topology
Hybrid Topology
 A network which contain all type of physical structure
and connected under a single backbone channel.
Hybrid Topology
 a
Considerations for choosing
topology
 Money-Bus n/w may be the least expensive way to
install a n/w.
 Length-of cable needed- the linear bus n/w uses
shorter lengths of cable.
 Future growth-with star topology, expending a n/w is
easily done by adding another devices.
 Cable type-most common used cable in commercial
organization is twisted pair. Which often
used with star topologies.
 Full mesh topology is theoretically the best since
every device is connected to every other device.(thus
maximizing speed and security. however, it quite
expensive to install)
 Next best would be tree topology, which is basically a
connection of star.
• 1973 by Bob Metacalfe (IEEE standard called 802.3 CSMA/CD)
Ethernet Overview
 Most popular packet-switched LAN technology
 Bandwidths: 10Mbps, 100Mbps, 1Gbps
 Max bus length: 2500m
 500m segments with 4 repeaters
 Bus and Star topologies are used to connect hosts
 Hosts attach to network via Ethernet transceiver or hub or switch
 Detects line state and sends/receives signals
 Hubs are used to facilitate shared connections
 All hosts on an Ethernet are competing for access to the medium
 Switches break this model
 Problem: Distributed algorithm that provides fair access
 Ethernet by definition is a broadcast protocol
 Any signal can be received by all hosts
 Switching enables individual hosts to communicate
 Network layer packets are transmitted over an
Ethernet by encapsulating
 Frame Format
Dest
addr
64 48 32
CRCPreamble Src
addr
Type Body
1648
• a section of a network where data packets can collide with one
another when being sent on a shared medium
• the larger the collision domain, the more likely it is that collision
will occur
•Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the
protocol for carrier transmission access in Ethernet networks. On
Ethernet, any device can try to send a frame at any time. Each device
senses whether the line is idle and therefore available to be used. If it
is, the device begins to transmit its first frame. If another device has
tried to send at the same time, a collision is said to occur and the
frames are discarded. Each device then waits a random amount of
time and retries until successful in getting its transmission sent.
Intranet is system in which multiple PCs are connected to each other.
PCs in intranet are not available to the world outside the intranet.
Usually each company or organization has their own Intranet
network and members/employees of that company can access the
computers in their intranet.
Each computer in Intranet is also identified by an IP Address which is
unique among the computers in that Intranet.
Intranet
(HCL)
Intranet
(Wipro)Internet
Extranet

More Related Content

What's hot

Sales agent Italy job description italiano
Sales agent Italy job description italianoSales agent Italy job description italiano
Sales agent Italy job description italianoSoren Healy
 
A Progressive Approach to the Past: Ensuring Backwards Compatability Through ...
A Progressive Approach to the Past: Ensuring Backwards Compatability Through ...A Progressive Approach to the Past: Ensuring Backwards Compatability Through ...
A Progressive Approach to the Past: Ensuring Backwards Compatability Through ...Derek Buitenhuis
 
Xilinx lca and altera flex
Xilinx lca and altera flexXilinx lca and altera flex
Xilinx lca and altera flexanishgoel
 
Kato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule
 
An Automatic Generation of NoC Architectures: An Application-Mapping Approach
An Automatic Generation of NoC Architectures: An Application-Mapping ApproachAn Automatic Generation of NoC Architectures: An Application-Mapping Approach
An Automatic Generation of NoC Architectures: An Application-Mapping ApproachMostafa Khamis
 
Signal Integrity - A Crash Course [R Lott]
Signal Integrity - A Crash Course [R Lott]Signal Integrity - A Crash Course [R Lott]
Signal Integrity - A Crash Course [R Lott]Ryan Lott
 
Simulation d'un réseau Ad-Hoc sous NS2
Simulation d'un réseau Ad-Hoc sous NS2Simulation d'un réseau Ad-Hoc sous NS2
Simulation d'un réseau Ad-Hoc sous NS2Rihab Chebbah
 
LED Blinking Using Raspberry Pi
LED Blinking Using Raspberry PiLED Blinking Using Raspberry Pi
LED Blinking Using Raspberry PiArjun R Krishna
 
Intel Core i7
Intel Core i7Intel Core i7
Intel Core i7Md Ajmat
 
Arduino uno-schematic reference design
Arduino uno-schematic reference designArduino uno-schematic reference design
Arduino uno-schematic reference designRimsky Cheng
 

What's hot (20)

Altera flex
Altera flexAltera flex
Altera flex
 
USB 3.0
USB 3.0USB 3.0
USB 3.0
 
Light Trees ppt
Light Trees pptLight Trees ppt
Light Trees ppt
 
Sales agent Italy job description italiano
Sales agent Italy job description italianoSales agent Italy job description italiano
Sales agent Italy job description italiano
 
A Progressive Approach to the Past: Ensuring Backwards Compatability Through ...
A Progressive Approach to the Past: Ensuring Backwards Compatability Through ...A Progressive Approach to the Past: Ensuring Backwards Compatability Through ...
A Progressive Approach to the Past: Ensuring Backwards Compatability Through ...
 
Usb 2
Usb 2Usb 2
Usb 2
 
Xilinx lca and altera flex
Xilinx lca and altera flexXilinx lca and altera flex
Xilinx lca and altera flex
 
Kato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance Computing
 
Usb Overview
Usb OverviewUsb Overview
Usb Overview
 
An Automatic Generation of NoC Architectures: An Application-Mapping Approach
An Automatic Generation of NoC Architectures: An Application-Mapping ApproachAn Automatic Generation of NoC Architectures: An Application-Mapping Approach
An Automatic Generation of NoC Architectures: An Application-Mapping Approach
 
Signal Integrity - A Crash Course [R Lott]
Signal Integrity - A Crash Course [R Lott]Signal Integrity - A Crash Course [R Lott]
Signal Integrity - A Crash Course [R Lott]
 
Simulation d'un réseau Ad-Hoc sous NS2
Simulation d'un réseau Ad-Hoc sous NS2Simulation d'un réseau Ad-Hoc sous NS2
Simulation d'un réseau Ad-Hoc sous NS2
 
FireWire
FireWireFireWire
FireWire
 
Wireless Charging
Wireless ChargingWireless Charging
Wireless Charging
 
LED Blinking Using Raspberry Pi
LED Blinking Using Raspberry PiLED Blinking Using Raspberry Pi
LED Blinking Using Raspberry Pi
 
Intel Core i7
Intel Core i7Intel Core i7
Intel Core i7
 
Mobile Processors
Mobile ProcessorsMobile Processors
Mobile Processors
 
Arduino uno-schematic reference design
Arduino uno-schematic reference designArduino uno-schematic reference design
Arduino uno-schematic reference design
 
VLSI
VLSIVLSI
VLSI
 
SPI Protocol
SPI ProtocolSPI Protocol
SPI Protocol
 

Viewers also liked

Network topologies
Network topologiesNetwork topologies
Network topologiesNorah Saad
 
Presentatie Pieter Dillingh
Presentatie Pieter DillinghPresentatie Pieter Dillingh
Presentatie Pieter DillinghEuropadialoog
 
Presentatie Kris Magnus
Presentatie Kris MagnusPresentatie Kris Magnus
Presentatie Kris MagnusEuropadialoog
 
Overcoming investor objection - Peter Garnham (Accelerate 2014 - Sheffield)
Overcoming investor objection - Peter Garnham (Accelerate 2014 - Sheffield)Overcoming investor objection - Peter Garnham (Accelerate 2014 - Sheffield)
Overcoming investor objection - Peter Garnham (Accelerate 2014 - Sheffield)Christopher Hill
 
Valentine's Day Activities
Valentine's Day ActivitiesValentine's Day Activities
Valentine's Day ActivitiesLynn Scotty
 
Presentatie Andy Klom
Presentatie Andy KlomPresentatie Andy Klom
Presentatie Andy KlomEuropadialoog
 
Presentatie Marijke van Hees
Presentatie Marijke van HeesPresentatie Marijke van Hees
Presentatie Marijke van HeesEuropadialoog
 
Accelerate from Social Entrepreneurs
Accelerate from Social Entrepreneurs Accelerate from Social Entrepreneurs
Accelerate from Social Entrepreneurs Christopher Hill
 
Film marketing
Film marketingFilm marketing
Film marketingAFG-Girl07
 
Presentatie Jeroen Smits
Presentatie Jeroen SmitsPresentatie Jeroen Smits
Presentatie Jeroen SmitsEuropadialoog
 
Presentatie Jitty van Doodewaerd
Presentatie Jitty van DoodewaerdPresentatie Jitty van Doodewaerd
Presentatie Jitty van DoodewaerdEuropadialoog
 
In Hurricane Season a Sump Pump is Key
In Hurricane Season a Sump Pump is KeyIn Hurricane Season a Sump Pump is Key
In Hurricane Season a Sump Pump is KeyTsurumiPumpSales.com
 

Viewers also liked (19)

Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 
Unit 1 ethernet vsd
Unit 1 ethernet vsdUnit 1 ethernet vsd
Unit 1 ethernet vsd
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
ASAMBLEA OCTUBRE
ASAMBLEA OCTUBREASAMBLEA OCTUBRE
ASAMBLEA OCTUBRE
 
Presentatie Pieter Dillingh
Presentatie Pieter DillinghPresentatie Pieter Dillingh
Presentatie Pieter Dillingh
 
Presentatie Kris Magnus
Presentatie Kris MagnusPresentatie Kris Magnus
Presentatie Kris Magnus
 
Overcoming investor objection - Peter Garnham (Accelerate 2014 - Sheffield)
Overcoming investor objection - Peter Garnham (Accelerate 2014 - Sheffield)Overcoming investor objection - Peter Garnham (Accelerate 2014 - Sheffield)
Overcoming investor objection - Peter Garnham (Accelerate 2014 - Sheffield)
 
Batería de palabras
Batería de palabrasBatería de palabras
Batería de palabras
 
Valentine's Day Activities
Valentine's Day ActivitiesValentine's Day Activities
Valentine's Day Activities
 
Presentatie Andy Klom
Presentatie Andy KlomPresentatie Andy Klom
Presentatie Andy Klom
 
Presentatie Marijke van Hees
Presentatie Marijke van HeesPresentatie Marijke van Hees
Presentatie Marijke van Hees
 
Accelerate from Social Entrepreneurs
Accelerate from Social Entrepreneurs Accelerate from Social Entrepreneurs
Accelerate from Social Entrepreneurs
 
Film marketing
Film marketingFilm marketing
Film marketing
 
Presentatie Jeroen Smits
Presentatie Jeroen SmitsPresentatie Jeroen Smits
Presentatie Jeroen Smits
 
Presentatie Jitty van Doodewaerd
Presentatie Jitty van DoodewaerdPresentatie Jitty van Doodewaerd
Presentatie Jitty van Doodewaerd
 
Global VPN
Global VPNGlobal VPN
Global VPN
 
Judge dredd
Judge dreddJudge dredd
Judge dredd
 
In Hurricane Season a Sump Pump is Key
In Hurricane Season a Sump Pump is KeyIn Hurricane Season a Sump Pump is Key
In Hurricane Season a Sump Pump is Key
 
Reflexiones
ReflexionesReflexiones
Reflexiones
 

Similar to 7 topology ethernet

Classification of Computer
Classification of ComputerClassification of Computer
Classification of ComputerAfsanaAkterRubi
 
Ccna(routing &and switching)
Ccna(routing &and switching)Ccna(routing &and switching)
Ccna(routing &and switching)Shweta Kumari
 
Network using topologies
Network using topologiesNetwork using topologies
Network using topologiesJaveria600
 
Open Elective MSE.pptx
Open Elective MSE.pptxOpen Elective MSE.pptx
Open Elective MSE.pptxathars248
 
basic networking
basic networkingbasic networking
basic networkingAnmol Bagga
 
lecture 2,3.pdf
lecture 2,3.pdflecture 2,3.pdf
lecture 2,3.pdfuseless45
 
NFPhysical Layer.pptx
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptxmmmm11111
 
CN-UNIT-1 09.01.23.ppt
CN-UNIT-1 09.01.23.pptCN-UNIT-1 09.01.23.ppt
CN-UNIT-1 09.01.23.pptjayapal385
 
Computer Network ssss ppt.pptx
Computer Network ssss ppt.pptxComputer Network ssss ppt.pptx
Computer Network ssss ppt.pptxRamNivas42
 
Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01Sayyed Nawaz
 
Chapter 1 - Network Topologies.pptx
Chapter 1 - Network Topologies.pptxChapter 1 - Network Topologies.pptx
Chapter 1 - Network Topologies.pptxNaeemAkhtar403523
 
CN Unit 1 part 1 2023.ppt
CN Unit 1 part 1 2023.pptCN Unit 1 part 1 2023.ppt
CN Unit 1 part 1 2023.pptmohanravi1986
 
Network ppt
Network pptNetwork ppt
Network ppthlalu861
 

Similar to 7 topology ethernet (20)

3.pptx
3.pptx3.pptx
3.pptx
 
Classification of Computer
Classification of ComputerClassification of Computer
Classification of Computer
 
original
originaloriginal
original
 
networking
networkingnetworking
networking
 
Lesson 8
Lesson 8Lesson 8
Lesson 8
 
Ccna(routing &and switching)
Ccna(routing &and switching)Ccna(routing &and switching)
Ccna(routing &and switching)
 
Network using topologies
Network using topologiesNetwork using topologies
Network using topologies
 
Open Elective MSE.pptx
Open Elective MSE.pptxOpen Elective MSE.pptx
Open Elective MSE.pptx
 
basic networking
basic networkingbasic networking
basic networking
 
Arvind Singh
Arvind SinghArvind Singh
Arvind Singh
 
lecture 2,3.pdf
lecture 2,3.pdflecture 2,3.pdf
lecture 2,3.pdf
 
NFPhysical Layer.pptx
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptx
 
CN-UNIT-1 09.01.23.ppt
CN-UNIT-1 09.01.23.pptCN-UNIT-1 09.01.23.ppt
CN-UNIT-1 09.01.23.ppt
 
CN UNIT1 TO UNIT 5.pdf
CN UNIT1 TO UNIT 5.pdfCN UNIT1 TO UNIT 5.pdf
CN UNIT1 TO UNIT 5.pdf
 
Computer Network ssss ppt.pptx
Computer Network ssss ppt.pptxComputer Network ssss ppt.pptx
Computer Network ssss ppt.pptx
 
Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01
 
Chapter 1 - Network Topologies.pptx
Chapter 1 - Network Topologies.pptxChapter 1 - Network Topologies.pptx
Chapter 1 - Network Topologies.pptx
 
Networking notes2
Networking notes2Networking notes2
Networking notes2
 
CN Unit 1 part 1 2023.ppt
CN Unit 1 part 1 2023.pptCN Unit 1 part 1 2023.ppt
CN Unit 1 part 1 2023.ppt
 
Network ppt
Network pptNetwork ppt
Network ppt
 

More from Samit Singh

mis structure.pptx
mis structure.pptxmis structure.pptx
mis structure.pptxSamit Singh
 
5 transmission media
5 transmission media5 transmission media
5 transmission mediaSamit Singh
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level Samit Singh
 

More from Samit Singh (6)

mis structure.pptx
mis structure.pptxmis structure.pptx
mis structure.pptx
 
6 ip
6 ip6 ip
6 ip
 
1 network intro
1 network intro1 network intro
1 network intro
 
5 transmission media
5 transmission media5 transmission media
5 transmission media
 
3 lan man wan
3 lan man wan3 lan man wan
3 lan man wan
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
 

Recently uploaded

Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 

Recently uploaded (20)

Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 

7 topology ethernet

  • 2. Topology  Topology refers to the layout of connected devices on a network.  Here, some logical layout of topology.  Mesh  Star  Bus  Ring  Tree and Hybrid
  • 4. Mesh Topology  Here every device has a point to point link to every other device.  Node 1 node must be connected with n-1 nodes.  A fully connected mesh can have n(n-1)/2 physical channels to link n devices.  It must have n-1 I/O ports.
  • 5. Mesh Topology Advantages: 1. They use dedicated links so each link can only carry its own data load. So traffic problem can be avoided. 2. It is robust. If any one link get damaged it cannot affect others. 3. It gives privacy and security.(Message travels along a dedicated link) 4. Fault identification and fault isolation are easy.
  • 8. Mesh Topology  Disadvantages: 1. The amount of cabling and the number of I/O ports required are very large. Since every device is connected to each devices through dedicated links. 2. The bulk of wiring is larger then the available space. 3. Hardware required to connected each device is highly expensive.
  • 9. Mesh Topology  Applications: 1. Telephone Regional office. 2. WAN.(Wide Area Network).
  • 10. Star Topology  Here each device has a dedicated point-to-point link to the central controller called “Hub”(Act as a Exchange).  There is no direct traffic between devices.  The transmission are occurred only through the central “hub”.  When device 1 wants to send data to device 2; First sends the data to hub. Which then relays the data to the other connected device.
  • 13. Star Topology  Advantages: 1. Less expensive then mesh since each device is connected only to the hub. 2. Installation and configuration are easy. 3. Less cabling is need then mesh. 4. Robustness.(if one link fails, only that links is affected. All other links remain active) 5. Easy to fault identification & to remove parts. 6. No distruptions to the network then connecting(or) removing devices.
  • 14. Star Topology  Disadvantages: 1. Even it requires less cabling then mesh when compared with other topologies it still large.(Ring or bus). 2. Dependency(whole n/w dependent on one single point(hub). When it goes down. The whole system is dead.
  • 15. Applications  Star topology used in Local Area Networks(LANs).  High speed LAN often used STAR.
  • 16.
  • 17. Asynchronous Transfer Mode  By the mid 1980s, three types of communication networks had evolved.  The telephone network carries voice calls, television network carries video transmissions, and newly emerging computer network carries data.  Telephone companies realized that voice communication was becoming a commodity service and that the profit margin would decrease over time.  They realized that data communication was increasing.  The telecommunication industry decided to expand its business by developing networks to carry traffic other than voice.
  • 18. Asynchronous Transfer Mode (ATM) is a switching technique for telecommunication networks. It uses asynchronous time-division multiplexing,[1][2] and it encodes data into small, fixed-sized cells. ATM differs from networks such as the Internet or Ethernet LANs that use variable sized packets or frames. ATM provides data link layer services that run over OSI Layer 1 physical links. ATM has functional similarity with both circuit switched networking and small packet switched networking. This makes it a good choice for a network that must handle both traditional high- speed data traffic (e.g., file transfers), and real-time, low-latency content such as voice and video. Asynchronous Transfer Mode
  • 19. ATM  ATM standard is widely accepted by common carriers as mode of operation for communication – particularly BISDN.  ATM is a form of cell switching using small fixed- sized packets. Header Payload 5 Bytes 48 Bytes Figure 9.1 Basic ATM Cell Format Leon-Garcia & Widjaja: Communication NetworksCopyright ©2000 The McGraw Hill Companies
  • 20. ATM is more complex, but this complexity allows to give guarantees as to data rate, maximum delay, and jitter. These are usually called Quality of Service. JITTER: In voice over IP (VoIP), jitter is the variation in the time between packets arriving, caused by network congestion, timing drift, or route changes. A jitter buffer can be used to handle jitter. Jitter is the deviation in or displacement of some aspect of the pulses in a high- frequency digital signal. Quality of Service or QoS is a method of providing better service for selected traffic types over various types of packet-switched networks.
  • 21. Advantages  Universality  Mixed traffic types, real-time and non-real-time  Scalability  LANs, MANs, WANs, WLANs  Efficient use of network resources Bandwidth on demand concept  Simplified network infrastructure
  • 22. Disadvantages  ATM has not been widely accepted. Although some phone companies still use it in their backbone networks.  The expense, complexity and lack of interoperability with other technologies have prevented ATM from becoming more prevalent.
  • 23. Disadvantages  Complexity of QoS: The complexity of the specification makes implementation cumbersome and difficult. Many implementations do not support the full standard.  Assumption of Homogeneity: ATM is designed to be a single, universal networking system. There is minimal provision for interoperating with other technologies
  • 24. Bus Topology  A bus topology is multipoint.  Here one long cable act as a backbone to link all the devices are connected to the backbone by drop lines and taps.  Drop line- is the connection b/w the devices and the cable.  Tap- is the splitter that cut the main link.  This allows only one device to transmit at a time.
  • 29. Bus Topology  A device want to communicate with other device on the n/ws sends a broadcast message onto the wire all other devices see.  But only the intended devices accepts and process the message.
  • 30. Bus Topology  Advantages: 1. Ease of installation 2. Less cabling Disadvantages: 1. Difficult reconfiguration and fault isolation. 2. Difficult to add new devices. 3. Signal reflection at top can degradation in quality. 4. If any fault in backbone can stops all transmission.
  • 31. Bus Topology  Applications:  Most computer motherboard.
  • 32. Ring Topology  Here each device has a dedicated connection with two devices on either side.  The signal is passed in one direction from device to device until it reaches the destination and each device have repeater.  When one device received signals instead of intended another device, its repeater then regenerates the data and passes them along.  To add or delete a device requires changing only two connections.
  • 36. Ring Topology  Advantages: 1. Easy to install. 2. Easy to reconfigure. 3. Fault identification is easy. Disadvantages: 1. Unidirectional traffic. 2. Break in a single ring can break entire network.
  • 37. Ring Topology  Applications:  Ring topologies are found in some office buildings or school campuses.  Today high speed LANs made this topology less popular.  EX… IBM Token Ring,FDDI
  • 38. • IBM created IEEE(Institute of Electrical and Electronics Engineers) 802.5 standard known as Token Ring • it uses a special packet known as Token • Multi-station Access Unit (MSAU)
  • 39.  A Token Ring network is a local area network (LAN) in which all computers are connected in a ring or star topology and a bit- or token-passing scheme is used in order to prevent the collision of data between two computers that want to send messages at the same time. The Token Ring protocol is the second most widely-used protocol on local area networks after Ethernet. The IBM Token Ring protocol led to a standard version, specified as IEEE 802.5. Both protocols are used and are very similar. The IEEE 802.5 Token Ring technology provides for data transfer rates of either 4 or 16 megabits per second.
  • 40. FDDI (Fiber Distributed Data Interface)  FDDI is a standard developed by the American National Standards Institute (ANSI) for transmitting data on optical fibers Supports transmission rates of up to 200 Mbps  Uses a dual ring  First ring used to carry data at 100 Mbps  Second ring used for primary backup in case first ring fails  If no backup is needed, second ring can also carry data, increasing the data rate up to 200 Mbps  Supports up to 1000 nodes  Has a range of up to 200 km  The possessor of the token is allowed to put a new token onto the ring as soon as it finished transmitting its frames
  • 41. Tree Topology  Alternatively referred to as a star bus topology.  Tree topology is one of the most common network setups that is similar to a bus topology and a star topology.  A tree topology connects multiple star networks to other star networks. Below is a visual example of a simple computer setup on a network using the star topology.
  • 43. Hybrid Topology  A network which contain all type of physical structure and connected under a single backbone channel.
  • 45. Considerations for choosing topology  Money-Bus n/w may be the least expensive way to install a n/w.  Length-of cable needed- the linear bus n/w uses shorter lengths of cable.  Future growth-with star topology, expending a n/w is easily done by adding another devices.  Cable type-most common used cable in commercial organization is twisted pair. Which often used with star topologies.
  • 46.  Full mesh topology is theoretically the best since every device is connected to every other device.(thus maximizing speed and security. however, it quite expensive to install)  Next best would be tree topology, which is basically a connection of star.
  • 47. • 1973 by Bob Metacalfe (IEEE standard called 802.3 CSMA/CD)
  • 48. Ethernet Overview  Most popular packet-switched LAN technology  Bandwidths: 10Mbps, 100Mbps, 1Gbps  Max bus length: 2500m  500m segments with 4 repeaters  Bus and Star topologies are used to connect hosts  Hosts attach to network via Ethernet transceiver or hub or switch  Detects line state and sends/receives signals  Hubs are used to facilitate shared connections  All hosts on an Ethernet are competing for access to the medium  Switches break this model  Problem: Distributed algorithm that provides fair access
  • 49.  Ethernet by definition is a broadcast protocol  Any signal can be received by all hosts  Switching enables individual hosts to communicate  Network layer packets are transmitted over an Ethernet by encapsulating  Frame Format Dest addr 64 48 32 CRCPreamble Src addr Type Body 1648
  • 50. • a section of a network where data packets can collide with one another when being sent on a shared medium • the larger the collision domain, the more likely it is that collision will occur
  • 51. •Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the protocol for carrier transmission access in Ethernet networks. On Ethernet, any device can try to send a frame at any time. Each device senses whether the line is idle and therefore available to be used. If it is, the device begins to transmit its first frame. If another device has tried to send at the same time, a collision is said to occur and the frames are discarded. Each device then waits a random amount of time and retries until successful in getting its transmission sent.
  • 52. Intranet is system in which multiple PCs are connected to each other. PCs in intranet are not available to the world outside the intranet. Usually each company or organization has their own Intranet network and members/employees of that company can access the computers in their intranet. Each computer in Intranet is also identified by an IP Address which is unique among the computers in that Intranet. Intranet (HCL) Intranet (Wipro)Internet Extranet