I m heartly thank full to our respected sir
for giving me such a great opportunity to
Give the presentation.
I m also thanks full to our respected Beni Thomes
sir for helping me in making this presentation.
network topologies bus star hybrid mesh ring tree
detail of all topology
advantages of ring topology
advantages of bus topology
advantages of mesh topology
advantages of star topology
advantages of hybrid topology
advantages of tree topology
I m heartly thank full to our respected sir
for giving me such a great opportunity to
Give the presentation.
I m also thanks full to our respected Beni Thomes
sir for helping me in making this presentation.
network topologies bus star hybrid mesh ring tree
detail of all topology
advantages of ring topology
advantages of bus topology
advantages of mesh topology
advantages of star topology
advantages of hybrid topology
advantages of tree topology
This presentation briefly describes the different types of computer networks along with their advantages and disadvantages and comparison between them.
Classification of Networks
Major Types of Networks
Topologies of Network for Local Area Networks
P2P Networks
Client to Server Network
Mesh topology
star topology
bus topology
This Slide includes:
1. Meaning of Network
2. Importance Of Network
3. Types of Network
3.1. On the basis of Topology.
3.1.1. Structured Topology
3.1.2. Unstructured Topology
3.2. On the basis of Architecture.
3.2.1. Peer-To-Peer Network.
3.2.2. Server-based Network.
3.3. On the basis of Geographical Area
3.3.1. Local Area Network (LAN).
3.3.2. Wide Area Network (WAN).
3.3.3. Metropolitan Area Network (MAN).
3.3.4. Virtual Private Network (VPN).
3.3.5. Storage Area Network (SAN).
3.3.6. Value Added Network (VAN).
- Uttar Tamang
Topology refers to the layout of connected devices on a network.
It also refers to how various nodes, devices, and connections on your network are physically or logically arranged in relation to each other.
Logical Layouts of Topology
Logical Layouts of Topology :
MESH TOPOLOGY
STAR TOPOLOGY
BUS TOPOLOGY
RING TOPOLOGY
TREE AND HYBRID
1. Mesh Topology
Here every device has a point to point link to every other device.
Node 1 node must be connected with n-1 nodes.
A fully connected mesh can have n(n-1)/2 physical channels to link n devices.
It must have n-1 I/O ports.
2.STAR TOPOLOGY
Less expensive than mesh since each device is connected only to the hub.
Installation and configuration are easy.
Less cabling needs than mesh.
Easy to identification & remove parts.
3.BUS TOPOLOGY
A bus topology is multipoint.
Here one long cable act as a backbone to link all the devices are connected to the backbone by drop lines and taps.
Drop line- is the connection b/w the devices and the cable.
Tap:- is the splitter that cut the main link.
This allows only one device to transmit at a time.
4.RING TOPOLOGY
Here each device has a dedicated connection with two devices on either side.
The signal is passed in one direction from device to device until it reaches the destination and each device have repeater
When one device received signal instead of intended another devices, its repeater then regenerates the data and passes them along.
To add or delete a device requires changing only two connections.
5.TREE TOPOLOGY
Alternative referred to as a star bus topology.
Tree topology is one of the most common network setups that is similar to a bus topology and a star topology.
A tree topology connects multiple star networks to other star networks. Below is a visual example of a simple computer setup on a network using the star topology.
6.HYBRID TOPOLOGY
A network which contains all types of physical structure and connected under a single backbone channel.
Learning Outcomes
A Network of Networks
Internet
Define Computer Networks
Define Communication
State Importance of Computer network and communication
Network classification
Types of networks
Comparison of different networks
TCP/IP
Hypertext Transfer Protocol
Internet
A network formed by the co-operative interconnection of a large no. of computer networks.
Since Internet is formed by the interconnection of no. of networks, sometimes its also called as network of networks
This presentation briefly describes the different types of computer networks along with their advantages and disadvantages and comparison between them.
Classification of Networks
Major Types of Networks
Topologies of Network for Local Area Networks
P2P Networks
Client to Server Network
Mesh topology
star topology
bus topology
This Slide includes:
1. Meaning of Network
2. Importance Of Network
3. Types of Network
3.1. On the basis of Topology.
3.1.1. Structured Topology
3.1.2. Unstructured Topology
3.2. On the basis of Architecture.
3.2.1. Peer-To-Peer Network.
3.2.2. Server-based Network.
3.3. On the basis of Geographical Area
3.3.1. Local Area Network (LAN).
3.3.2. Wide Area Network (WAN).
3.3.3. Metropolitan Area Network (MAN).
3.3.4. Virtual Private Network (VPN).
3.3.5. Storage Area Network (SAN).
3.3.6. Value Added Network (VAN).
- Uttar Tamang
Topology refers to the layout of connected devices on a network.
It also refers to how various nodes, devices, and connections on your network are physically or logically arranged in relation to each other.
Logical Layouts of Topology
Logical Layouts of Topology :
MESH TOPOLOGY
STAR TOPOLOGY
BUS TOPOLOGY
RING TOPOLOGY
TREE AND HYBRID
1. Mesh Topology
Here every device has a point to point link to every other device.
Node 1 node must be connected with n-1 nodes.
A fully connected mesh can have n(n-1)/2 physical channels to link n devices.
It must have n-1 I/O ports.
2.STAR TOPOLOGY
Less expensive than mesh since each device is connected only to the hub.
Installation and configuration are easy.
Less cabling needs than mesh.
Easy to identification & remove parts.
3.BUS TOPOLOGY
A bus topology is multipoint.
Here one long cable act as a backbone to link all the devices are connected to the backbone by drop lines and taps.
Drop line- is the connection b/w the devices and the cable.
Tap:- is the splitter that cut the main link.
This allows only one device to transmit at a time.
4.RING TOPOLOGY
Here each device has a dedicated connection with two devices on either side.
The signal is passed in one direction from device to device until it reaches the destination and each device have repeater
When one device received signal instead of intended another devices, its repeater then regenerates the data and passes them along.
To add or delete a device requires changing only two connections.
5.TREE TOPOLOGY
Alternative referred to as a star bus topology.
Tree topology is one of the most common network setups that is similar to a bus topology and a star topology.
A tree topology connects multiple star networks to other star networks. Below is a visual example of a simple computer setup on a network using the star topology.
6.HYBRID TOPOLOGY
A network which contains all types of physical structure and connected under a single backbone channel.
Learning Outcomes
A Network of Networks
Internet
Define Computer Networks
Define Communication
State Importance of Computer network and communication
Network classification
Types of networks
Comparison of different networks
TCP/IP
Hypertext Transfer Protocol
Internet
A network formed by the co-operative interconnection of a large no. of computer networks.
Since Internet is formed by the interconnection of no. of networks, sometimes its also called as network of networks
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
2. TOPOLOGY
T O P O L O G Y I S P H Y S I C A L A R R A N G E M E N T O F C O N N E C T I N G
V A R I O U S C O M P U T E R F O R N E T W O R K I N G .
3. TYPES OF TOPOLOGY
Ring topology
Bus topology
Star topology
Tree topology
4. RING TOPOLOGY
Here all the nodes are joined together to form a ring. There is no central server
in this case.
ADVANTAGES:
Short cable length
Suitable for optical fibres
DISADVANTAGES:
Network reconfiguration is difficult
Topology affects the access protocol
6. BUS TOPOLOGY
Here all the nodes share a common bus of connecting cables.
ADVANTAGES:
Short cable length and simple wiring layout
Easy to extend
DISADVANTAGES:
Fault identification is difficult
Fault isolation is difficult
8. STAR TOPOLOGY
Here all the nodes are connected to a centralized computer.
ADVANTAGES:
Fault identification is easy
Fault isolation is easy
DISADVANTAGES:
Long cable length
Difficult to expand
10. TREE TOPOLOGY
Here nodes are linked in a stage or phase.
ADVANTAGES:
Easy to expand
Fault isolation is easy
DISADVANTAGES:
Dependent on the root
Difficult for installation