SlideShare a Scribd company logo
DATADATA
COMMUNICATIONCOMMUNICATION
LeCTUre-3LeCTUre-3
reCAp Of LeCTUre 2reCAp Of LeCTUre 2
• Key DataCommunication Terminology
• DataFlow/ Transmission Modes
• Networksand Why weneed Them?
• Distributed Processing
• Network Criteria
• Physical structureof Network
• Typeof connection
OvervIew Of LeCTUre 3OvervIew Of LeCTUre 3
• Physical Structureof Network
• Physical Topologies
1. Bus
2. Mesh
3. Star
4. Ring
5. Tree
6. Hybrid
TOpOLOgy
“The Topology is the geometric
representation of the relationship of
the links and linking devices”
OR
“Topology defines physical or logical
arrangement of links in a Network”
TOpOLOgy (CONT.)
• The ways in which the wires can be run in the network
to link with thecomputer.
• The ways in which the connections are made in the
network.
• Simply Thephysical layout of thenetwork.
CATegOrIes Of TOpOLOgy
Topology
Mesh Star Tree Bus Ring
BUs TOpOLOgy
BUs TOpOLOgy (CONT.)
• Structure
• A bustopology, ismultipoint.
• Onelong cableactsasabackboneto link all thedevicesin anetwork.
• Nodesareconnected to thebuscableby drop linesand taps.
• A drop line is a connection running between the device and the main
cable.
• A tap is a connector that either splices into the main cable or punctures
thesheathing of acableto createacontact with themetallic core.
• As a signal travels along the backbone, some of its energy is transformed
into heat. Therefore, it becomes weaker and weaker as it travels farther
and farther. For this reason there is a limit on the number of taps a bus
can support and on thedistancebetween thosetaps.
BUs TOpOLOgy (CONT.)
• In abusnetwork every workstation needs
• BNC Barrel Connectors
• T-Connectors
• Terminators
• NIC.
• T-Connectors are used to provide connection from the bus link to a
workstation.
• NIC (Network Interface Card) is used to link a workstation with the
network.
• Barrel Connectors are used to connect two parts of a cable either broken
or when additional wireisrequired.
• Terminators areused for Termination purpose.
• Basically Thin Coaxial Cableisused in thistopology.
BUs TOpOLOgy (CONT.)
• Uses:
• It is often used when network installation is small, simply
or temporary.
• Busisapassivetopology,
• i.e. no activeelectron isused to amplify thesignal.
Bus Topology (ConT.)
• WORKING:
• Broadcast network
• all the computers on the network receive the information, but
only one computer (the one with the address that matches the
oneencoded in themessage) acceptstheinformation. Therest
disregardsthemessage.
• Protocol used is CSMA/CD (Carrier Sense Multiple Access
with Collision Detection),
• i.e. only one device can transmit the data at a time. More than
one signal introduces collision. It means if one computer
sends a signal over the bus; the other computer must wait for
sometime.
Bus Topology (ConT.)
Another important issuein busnetwork istermination.
Without termination, when thesignal reachestheend of the
wire, it bounces back and travels back up the wire which
makesthenetwork busy.
To stop the bouncing signal, we attach terminators at either
end of segment.
The terminator absorbs the electrical energy and stops the
reflection.
Example
○ Ethernet10Base2, 10Base5, and ARC Net.
Bus Topology (ConT.)
• ADVANTAGES
• popular because its working requirements are
comparatively simple, and growth is accomplished easily
and quickly.
• Easy to useand understand.
• It isreliablein small networks.
• Repeater can beused to extend thenetwork.
• It requiresleast amount of cable.
• It islessexpensivein cost.
Bus Topology (ConT.)
• DISADVANTAGES
• Heavy network traffic can slow the Bus, considerably
(morecollision, morewaiting time).
• Each BNC Barrel connecter weakens the signals as it
absorbsenergy for itsown charge.
• Difficult to troubleshoot and maintain because of cable
break, looseconnector, and malfunctioning computer.
• Singlecomputer failuredisturbsthewholenetwork.
• Not a good choice for large organizations, because of
slow datatraffic.
Mesh Topology
Mesh Topology (ConT.)
• In a mesh topology, every device has a dedicated point-to-point
link to every other device.
• The term dedicated means that the link carries traffic only
between thetwo devicesit connects.
• Primarily used in networksthat aremostly not LANs.
• Madeup of multiplepoint to point connections.
• Mesh networks can get complicated very quickly, because many
connectionsmust bemanaged in anetwork of any size.
• Mesh topology haveredundant linksbetween devices.
• Each workstation is connected with a multi-port device like HUB
that broadcaststhedata.
• Therearetwo typesof Mesh, i.e.
• TrueMesh
• HybridMesh
Mesh Topology (ConT.)
• TRUEMESH
• A true Mesh has a link between each device in the
network.
• It meansthat network isfully connected.
• A true mesh of six devices requires fifteen connections (5
x 6)/2 = 15 links and that for seven devices requires 21
links.
• The formula for finding total links in a true mesh is [n *
(n– 1)] /2, wherenistotal number of workstations.
Mesh Topology (ConT.)
• HYBRIDMESH
• Hybrid Mesh has extra links but not fully connected.
Most Mesh topology networks are Hybrid Mesh
networks.
links and porTs in Mesh
Topology
• Number of Linksrequired to connect ‘n’ devices: n(n-1)/2
• Number of I/O Ports: n-1
• In figureabove, wehave5 Nodes, therefore:
• No. of Links= 5(5-1)/2 = 10
• No. of I/O Ports= 5-1 = 4
Mesh Topology (ConT.)
• ADVANTAGES
• Each dedicated connection can carry its own data load,
thuseliminating thetraffic problems.
• It is robust. If one link becomes unusable, it does not
incapacitatetheentiresystem.
• privacy or security. Physical boundaries prevent other
usersfrom gaining accessto messages.
• Point-to-point links make fault identification and fault
isolation easy.
Mesh Topology (ConT.)
• DISADVANTAGES:
• Amount of cabling and thenumber of I/O portsrequired
• Installation and reconnection aredifficult.
• The sheer bulk of the wiring can be greater than the
available space (in walls, ceilings, or floors) can
accommodate.
• The hardware required to connect each link (I/O ports and
cable) can beprohibitively expensive.
sTar Topology
sTar Topology (ConT.)
• Most commonly used network topology
• STRUCTURE:
• Each device has a dedicated point-to-point link only to a
central controller, usually called ahub or switch.
• Thedevicesarenot directly linked to oneanother.
• Unlike a mesh topology, a star topology does not allow
direct traffic between devices.
• The controller acts as an exchange: If one device wants to
send data to another, it sends the data to the controller,
which then relaysthedatato theother connected device.
sTar Topology (ConT.)
• WORKING:
• Each computer on star network communicates with a
Hub, that resend the message either to all computers
which is called Broadcasting Star or only to the
destination nodewhich iscalled Switched Star.
• Now-a-daysmost of Switched Star networksuseSwitches
instead of Intelligent Hubs because switches are less
expensivethan Intelligent hubs.
sTar Topology (ConT.)
• ADVANTAGES:
• Easy modification and expansion, without disturbing rest of the
network.
• Singlecomputer failuredoesnot affect thewholenetwork.
• Support of several cablestypesin thesamenetwork.
• Most flexibleof thethreetopologiesand easiest to diagnose.
• It islessexpensivethan amesh topology.
• Each device needs only one link and one I/O port to connect it
to any number of others.
• Thisfactor also makesit easy to install and reconfigure.
• Far lesscabling needed ascompareto mesh topology.
• Robustness. If one link fails, only that link is affected. All other
links remain active. This factor also lends itself to easy fault
identification and fault isolation.
sTar Topology (ConT.)
• DISADVANTAGES:
• Dependency of the whole topology on one single point,
thehub. If thehub goesdown, thewholesystem isdead.
• More cables are required as compare to Bus and Ring
topology and also Hub isexpensive.
rIng Topology
rIng TopologyrIng Topology
• Each device has a dedicated point-to-point connection with
only thetwo deviceson either sideof it.
• A signal is passed along the ring in one direction, from device
to device, until it reachesitsdestination.
• Each device in the ring incorporates a repeater. When a device
receives a signal intended for another device, its repeater
regeneratesthebitsand passesthem along
• Cable may be Coaxial with connectors or may be twisted pair
with aHUB. Commonly Twisted Pair cableisused.
• Thereisno termination becausethereisno end to thering.
1.29
rIng TopologyrIng Topology
rIng Topology
• Working:
• For data transmission, medium access is required that is done by Token
and thetechniqueisknown asToken Passing.
• Token is a short message that is passed around the ring until a computer
wishes to sends information to another computer, That computer modifies
thetoken, addsan electronic address& data, and sendsit around thering.
• Each computer in sequence receives the token and the information and
passes them to the next computer until either the electronic address
matches the address of a computer or the token returns to its origin. The
receiving computer returns a message to the originator indicating that the
messagehasbeen received.
• The sending computer then creates the token and begins transmitting. The
token circulatesuntil astation isready to send and capturesthetoken.
RING TOPOLOGY
• This all happens very quickly, a token can circle a ring 200
meters in diameter at about 10,000 times a second. Some
faster networkscirculateseveral tokensat once.
• Transmitted data moves in clockwise direction therefore there
isno chanceof collision.
• Example: FDDI is a fast fiber-optic network based on the
ring topology. Token ring isanother ring based network.
RING TOPOLOGYRING TOPOLOGY
• ADVANTAGES:
• It eliminates LANs depending on a central computer by
distributing someof thecentral systemsresponsibility to all
theother connected workstation.
• Every workstation on the ring listens to see if the network
is clear before sending a message. This helps avoiding
collision between themessages.
• The network degrades gracefully as more users we added
i.e. thenetwork doesn’t failed.
RING TOPOLOGYRING TOPOLOGY
• DISADVANTAGES:
• Failure of one computer on the ring can affect the whole
network.
• Also difficult to troubleshoot.
• Adding or removing nodesdisturb thenetwork.
TRee TOPOLOGYTRee TOPOLOGY
hYbRId TOPOLOGY:hYbRId TOPOLOGY:
a sTaR backbONe wITh ThRee bus NeTwORksa sTaR backbONe wITh ThRee bus NeTwORks
summaRYsummaRY
• Physical Structureof Network
• Physical Topologies
1. Bus
2. Mesh
3. Star
4. Ring
5. Tree
6. Hybrid
suGGesTed ReadINGsuGGesTed ReadING
• Section
– 1.2
• “Data Communications and Networking” 4th
Edition by
Behrouz A. Forouzan

More Related Content

What's hot

Network topologies & network devices
Network topologies & network devicesNetwork topologies & network devices
Network topologies & network devices
Annajab
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer NetworkingHj Habib
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
Mziaulla
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
SOLOMONCHINAEMEUCHEA
 
Computer Networks basics and OSI
Computer Networks basics and OSIComputer Networks basics and OSI
Computer Networks basics and OSI
CS_GDRCST
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application ppt
Nitesh Dubey
 
20372748 case-study-on-computer-networking-kotak-mahindra-bank
20372748 case-study-on-computer-networking-kotak-mahindra-bank20372748 case-study-on-computer-networking-kotak-mahindra-bank
20372748 case-study-on-computer-networking-kotak-mahindra-bankShivani Joshi
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Rutwik Jadhav
 
Introduction of network
Introduction of networkIntroduction of network
Introduction of network
sharone singh
 
Network topoligies
Network topoligiesNetwork topoligies
Network topoligiesAli Kamran
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
Sujon Kumar Dey
 
Networking ppt by swapi
Networking ppt by swapi Networking ppt by swapi
Networking ppt by swapi Swapi Pawar
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologies
Ayush0734
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
Shovan Mandal
 
Computer network
Computer  networkComputer  network
Computer network
Poorna Chandu Pati
 
Networks PPT
Networks PPTNetworks PPT
Networks PPT
Singh Bedi
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
Milind Prajapat
 
DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)
Rasan Samarasinghe
 

What's hot (20)

Network topologies & network devices
Network topologies & network devicesNetwork topologies & network devices
Network topologies & network devices
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
 
Computer Networks basics and OSI
Computer Networks basics and OSIComputer Networks basics and OSI
Computer Networks basics and OSI
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application ppt
 
Topology
TopologyTopology
Topology
 
20372748 case-study-on-computer-networking-kotak-mahindra-bank
20372748 case-study-on-computer-networking-kotak-mahindra-bank20372748 case-study-on-computer-networking-kotak-mahindra-bank
20372748 case-study-on-computer-networking-kotak-mahindra-bank
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Introduction of network
Introduction of networkIntroduction of network
Introduction of network
 
Network topoligies
Network topoligiesNetwork topoligies
Network topoligies
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Networking ppt by swapi
Networking ppt by swapi Networking ppt by swapi
Networking ppt by swapi
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologies
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Computer network
Computer  networkComputer  network
Computer network
 
Networks PPT
Networks PPTNetworks PPT
Networks PPT
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)
 

Viewers also liked

Dc lec-05 (protocols & standards)
Dc lec-05 (protocols & standards)Dc lec-05 (protocols & standards)
Dc lec-05 (protocols & standards)
diaryinc
 
Whats New In Visual Studio 2010
Whats New In Visual Studio 2010Whats New In Visual Studio 2010
Whats New In Visual Studio 2010
Daniel Egan
 
Dc lec-06 & 07 (osi model)
Dc lec-06 & 07 (osi model)Dc lec-06 & 07 (osi model)
Dc lec-06 & 07 (osi model)
diaryinc
 
Parts of Speech
Parts of SpeechParts of Speech
Parts of Speech
diaryinc
 
Building DotNetNuke Modules
Building DotNetNuke ModulesBuilding DotNetNuke Modules
Building DotNetNuke Modules
Engage Software
 
Dc lec- (network models)
Dc lec- (network models)Dc lec- (network models)
Dc lec- (network models)
diaryinc
 
VB.Net GUI Unit_01
VB.Net GUI Unit_01VB.Net GUI Unit_01
VB.Net GUI Unit_01
Prashanth Shivakumar
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technologyWish Mrt'xa
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Users
almario1988
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
stanbridge
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
Atul Kumar Pandey
 
Presentation on Bangladesh
Presentation on BangladeshPresentation on Bangladesh
Presentation on Bangladesh
Tawhid Rahman
 
Networking lecture 4 Data Link Layer by Mamun sir
Networking lecture 4 Data Link Layer by Mamun sirNetworking lecture 4 Data Link Layer by Mamun sir
Networking lecture 4 Data Link Layer by Mamun sir
sharifbdp
 
IP addressing by Mamun Sir
IP addressing by Mamun SirIP addressing by Mamun Sir
IP addressing by Mamun Sir
sharifbdp
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
Shafaan Khaliq Bhatti
 

Viewers also liked (20)

Dc lec-05 (protocols & standards)
Dc lec-05 (protocols & standards)Dc lec-05 (protocols & standards)
Dc lec-05 (protocols & standards)
 
Whats New In Visual Studio 2010
Whats New In Visual Studio 2010Whats New In Visual Studio 2010
Whats New In Visual Studio 2010
 
Osi layer notes
Osi layer notesOsi layer notes
Osi layer notes
 
Dc lec-06 & 07 (osi model)
Dc lec-06 & 07 (osi model)Dc lec-06 & 07 (osi model)
Dc lec-06 & 07 (osi model)
 
Parts of Speech
Parts of SpeechParts of Speech
Parts of Speech
 
Introduction to Visual Studio.NET
Introduction to Visual Studio.NETIntroduction to Visual Studio.NET
Introduction to Visual Studio.NET
 
Building DotNetNuke Modules
Building DotNetNuke ModulesBuilding DotNetNuke Modules
Building DotNetNuke Modules
 
Dc lec- (network models)
Dc lec- (network models)Dc lec- (network models)
Dc lec- (network models)
 
VB.Net GUI Unit_01
VB.Net GUI Unit_01VB.Net GUI Unit_01
VB.Net GUI Unit_01
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technology
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Users
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Dotnet basics
Dotnet basicsDotnet basics
Dotnet basics
 
Presentation on Bangladesh
Presentation on BangladeshPresentation on Bangladesh
Presentation on Bangladesh
 
Networking lecture 4 Data Link Layer by Mamun sir
Networking lecture 4 Data Link Layer by Mamun sirNetworking lecture 4 Data Link Layer by Mamun sir
Networking lecture 4 Data Link Layer by Mamun sir
 
IP addressing by Mamun Sir
IP addressing by Mamun SirIP addressing by Mamun Sir
IP addressing by Mamun Sir
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 

Similar to Dc lec-03 (topologies)

Unit 1 Information Technology for student👩‍🎓.pdf
Unit 1 Information Technology for student👩‍🎓.pdfUnit 1 Information Technology for student👩‍🎓.pdf
Unit 1 Information Technology for student👩‍🎓.pdf
shuklagyanprakash578
 
Network topologies
Network topologiesNetwork topologies
Network topologies
Norah Saad
 
Mithun Network topology .pptx
Mithun Network topology .pptxMithun Network topology .pptx
Mithun Network topology .pptx
Mithun838675
 
Networks topologies Lec#2
Networks topologies Lec#2Networks topologies Lec#2
Networks topologies Lec#2
Punjab and Superior College, Pakpattan
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
Shamima Akther
 
1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf
sophia763824
 
1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf
JamesOtieno34
 
Web applications and security. By: Partha Jee Chauhan, MSc Computer Science
Web applications and security. By: Partha Jee Chauhan, MSc Computer ScienceWeb applications and security. By: Partha Jee Chauhan, MSc Computer Science
Web applications and security. By: Partha Jee Chauhan, MSc Computer Science
Partha Jee Chauhan
 
Computer network
Computer networkComputer network
Computer network
Simran Kaur
 
Topology,Switching and Routing
Topology,Switching and RoutingTopology,Switching and Routing
Topology,Switching and Routing
Anushiya Ram
 
1-introduction-to-computer-networking-converted 2.pptx
1-introduction-to-computer-networking-converted 2.pptx1-introduction-to-computer-networking-converted 2.pptx
1-introduction-to-computer-networking-converted 2.pptx
Yashwant Srikrishnan
 
Network Topology
Network TopologyNetwork Topology
Network Topology
AmshalEjaz1
 
Computer Network
Computer NetworkComputer Network
Computer Network
Subhash Vadadoriya
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptx
AASTHAJAJOO
 
Network Topology
Network Topology Network Topology
Network Topology
Md.Al-amin Hossen
 
Chapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBChapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMB
dhanashrisabale1
 
Chapter 1 ppt by dmb
Chapter 1 ppt by dmbChapter 1 ppt by dmb
Chapter 1 ppt by dmb
dhanashrisabale1
 
Lecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.pptLecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.ppt
flyinimohamed
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methods
Raja Waseem Akhtar
 
Unit2.2
Unit2.2Unit2.2

Similar to Dc lec-03 (topologies) (20)

Unit 1 Information Technology for student👩‍🎓.pdf
Unit 1 Information Technology for student👩‍🎓.pdfUnit 1 Information Technology for student👩‍🎓.pdf
Unit 1 Information Technology for student👩‍🎓.pdf
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Mithun Network topology .pptx
Mithun Network topology .pptxMithun Network topology .pptx
Mithun Network topology .pptx
 
Networks topologies Lec#2
Networks topologies Lec#2Networks topologies Lec#2
Networks topologies Lec#2
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf
 
1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf
 
Web applications and security. By: Partha Jee Chauhan, MSc Computer Science
Web applications and security. By: Partha Jee Chauhan, MSc Computer ScienceWeb applications and security. By: Partha Jee Chauhan, MSc Computer Science
Web applications and security. By: Partha Jee Chauhan, MSc Computer Science
 
Computer network
Computer networkComputer network
Computer network
 
Topology,Switching and Routing
Topology,Switching and RoutingTopology,Switching and Routing
Topology,Switching and Routing
 
1-introduction-to-computer-networking-converted 2.pptx
1-introduction-to-computer-networking-converted 2.pptx1-introduction-to-computer-networking-converted 2.pptx
1-introduction-to-computer-networking-converted 2.pptx
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptx
 
Network Topology
Network Topology Network Topology
Network Topology
 
Chapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBChapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMB
 
Chapter 1 ppt by dmb
Chapter 1 ppt by dmbChapter 1 ppt by dmb
Chapter 1 ppt by dmb
 
Lecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.pptLecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.ppt
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methods
 
Unit2.2
Unit2.2Unit2.2
Unit2.2
 

More from diaryinc

Nationalization Act In Pakistan
Nationalization Act In PakistanNationalization Act In Pakistan
Nationalization Act In Pakistan
diaryinc
 
SUMMARY OF “EVOLUTION OF MANAGEMENT THINKING”
SUMMARY OF “EVOLUTION OF MANAGEMENT THINKING”SUMMARY OF “EVOLUTION OF MANAGEMENT THINKING”
SUMMARY OF “EVOLUTION OF MANAGEMENT THINKING”
diaryinc
 
PURPOSE OF GOALS & PLANS
PURPOSE OF GOALS & PLANSPURPOSE OF GOALS & PLANS
PURPOSE OF GOALS & PLANS
diaryinc
 
STRATEGY FORMULATION AND IMPLEMENTATION
STRATEGY FORMULATION AND IMPLEMENTATIONSTRATEGY FORMULATION AND IMPLEMENTATION
STRATEGY FORMULATION AND IMPLEMENTATION
diaryinc
 
Pakistan state Oil (PSO)
Pakistan state Oil (PSO)Pakistan state Oil (PSO)
Pakistan state Oil (PSO)
diaryinc
 
Business plan of YOGA INSTITUTE
Business plan of YOGA INSTITUTE Business plan of YOGA INSTITUTE
Business plan of YOGA INSTITUTE
diaryinc
 
Business plan for " A CHILDCARE CENTER IN PESHAWAR"
Business plan for " A CHILDCARE CENTER IN PESHAWAR"Business plan for " A CHILDCARE CENTER IN PESHAWAR"
Business plan for " A CHILDCARE CENTER IN PESHAWAR"
diaryinc
 
Financial accounting solution manual
Financial accounting solution manualFinancial accounting solution manual
Financial accounting solution manual
diaryinc
 
Nts book-for-gat-general
Nts book-for-gat-generalNts book-for-gat-general
Nts book-for-gat-general
diaryinc
 
Edwardes College Prospectus 2014-15
Edwardes College Prospectus 2014-15Edwardes College Prospectus 2014-15
Edwardes College Prospectus 2014-15
diaryinc
 
The Role of the Library in Promoting Student in Learning
The Role of the Library in Promoting Student in LearningThe Role of the Library in Promoting Student in Learning
The Role of the Library in Promoting Student in Learning
diaryinc
 
Bank al habib Financial Statement.
Bank al habib Financial Statement.Bank al habib Financial Statement.
Bank al habib Financial Statement.
diaryinc
 
Economic history of Pakistan.
Economic history of Pakistan.Economic history of Pakistan.
Economic history of Pakistan.
diaryinc
 
Use of library by the students
 Use of library by the students Use of library by the students
Use of library by the students
diaryinc
 
Complete History of Pakistan
Complete History of PakistanComplete History of Pakistan
Complete History of Pakistan
diaryinc
 
Black Magic & Fake Pir in Pakistan.
Black Magic & Fake Pir in Pakistan.Black Magic & Fake Pir in Pakistan.
Black Magic & Fake Pir in Pakistan.
diaryinc
 
Role Of Industries In The Economy Of Pakistan
Role Of Industries In The Economy Of Pakistan Role Of Industries In The Economy Of Pakistan
Role Of Industries In The Economy Of Pakistan
diaryinc
 
Technology and its impact on industrial world
Technology and its impact on industrial worldTechnology and its impact on industrial world
Technology and its impact on industrial world
diaryinc
 
Economic Condition of Afghanistan
Economic Condition of Afghanistan Economic Condition of Afghanistan
Economic Condition of Afghanistan
diaryinc
 
PEPSI VS COCA COLA
PEPSI VS COCA COLAPEPSI VS COCA COLA
PEPSI VS COCA COLA
diaryinc
 

More from diaryinc (20)

Nationalization Act In Pakistan
Nationalization Act In PakistanNationalization Act In Pakistan
Nationalization Act In Pakistan
 
SUMMARY OF “EVOLUTION OF MANAGEMENT THINKING”
SUMMARY OF “EVOLUTION OF MANAGEMENT THINKING”SUMMARY OF “EVOLUTION OF MANAGEMENT THINKING”
SUMMARY OF “EVOLUTION OF MANAGEMENT THINKING”
 
PURPOSE OF GOALS & PLANS
PURPOSE OF GOALS & PLANSPURPOSE OF GOALS & PLANS
PURPOSE OF GOALS & PLANS
 
STRATEGY FORMULATION AND IMPLEMENTATION
STRATEGY FORMULATION AND IMPLEMENTATIONSTRATEGY FORMULATION AND IMPLEMENTATION
STRATEGY FORMULATION AND IMPLEMENTATION
 
Pakistan state Oil (PSO)
Pakistan state Oil (PSO)Pakistan state Oil (PSO)
Pakistan state Oil (PSO)
 
Business plan of YOGA INSTITUTE
Business plan of YOGA INSTITUTE Business plan of YOGA INSTITUTE
Business plan of YOGA INSTITUTE
 
Business plan for " A CHILDCARE CENTER IN PESHAWAR"
Business plan for " A CHILDCARE CENTER IN PESHAWAR"Business plan for " A CHILDCARE CENTER IN PESHAWAR"
Business plan for " A CHILDCARE CENTER IN PESHAWAR"
 
Financial accounting solution manual
Financial accounting solution manualFinancial accounting solution manual
Financial accounting solution manual
 
Nts book-for-gat-general
Nts book-for-gat-generalNts book-for-gat-general
Nts book-for-gat-general
 
Edwardes College Prospectus 2014-15
Edwardes College Prospectus 2014-15Edwardes College Prospectus 2014-15
Edwardes College Prospectus 2014-15
 
The Role of the Library in Promoting Student in Learning
The Role of the Library in Promoting Student in LearningThe Role of the Library in Promoting Student in Learning
The Role of the Library in Promoting Student in Learning
 
Bank al habib Financial Statement.
Bank al habib Financial Statement.Bank al habib Financial Statement.
Bank al habib Financial Statement.
 
Economic history of Pakistan.
Economic history of Pakistan.Economic history of Pakistan.
Economic history of Pakistan.
 
Use of library by the students
 Use of library by the students Use of library by the students
Use of library by the students
 
Complete History of Pakistan
Complete History of PakistanComplete History of Pakistan
Complete History of Pakistan
 
Black Magic & Fake Pir in Pakistan.
Black Magic & Fake Pir in Pakistan.Black Magic & Fake Pir in Pakistan.
Black Magic & Fake Pir in Pakistan.
 
Role Of Industries In The Economy Of Pakistan
Role Of Industries In The Economy Of Pakistan Role Of Industries In The Economy Of Pakistan
Role Of Industries In The Economy Of Pakistan
 
Technology and its impact on industrial world
Technology and its impact on industrial worldTechnology and its impact on industrial world
Technology and its impact on industrial world
 
Economic Condition of Afghanistan
Economic Condition of Afghanistan Economic Condition of Afghanistan
Economic Condition of Afghanistan
 
PEPSI VS COCA COLA
PEPSI VS COCA COLAPEPSI VS COCA COLA
PEPSI VS COCA COLA
 

Recently uploaded

Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 

Recently uploaded (20)

Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 

Dc lec-03 (topologies)

  • 2. reCAp Of LeCTUre 2reCAp Of LeCTUre 2 • Key DataCommunication Terminology • DataFlow/ Transmission Modes • Networksand Why weneed Them? • Distributed Processing • Network Criteria • Physical structureof Network • Typeof connection
  • 3. OvervIew Of LeCTUre 3OvervIew Of LeCTUre 3 • Physical Structureof Network • Physical Topologies 1. Bus 2. Mesh 3. Star 4. Ring 5. Tree 6. Hybrid
  • 4. TOpOLOgy “The Topology is the geometric representation of the relationship of the links and linking devices” OR “Topology defines physical or logical arrangement of links in a Network”
  • 5. TOpOLOgy (CONT.) • The ways in which the wires can be run in the network to link with thecomputer. • The ways in which the connections are made in the network. • Simply Thephysical layout of thenetwork.
  • 8. BUs TOpOLOgy (CONT.) • Structure • A bustopology, ismultipoint. • Onelong cableactsasabackboneto link all thedevicesin anetwork. • Nodesareconnected to thebuscableby drop linesand taps. • A drop line is a connection running between the device and the main cable. • A tap is a connector that either splices into the main cable or punctures thesheathing of acableto createacontact with themetallic core. • As a signal travels along the backbone, some of its energy is transformed into heat. Therefore, it becomes weaker and weaker as it travels farther and farther. For this reason there is a limit on the number of taps a bus can support and on thedistancebetween thosetaps.
  • 9. BUs TOpOLOgy (CONT.) • In abusnetwork every workstation needs • BNC Barrel Connectors • T-Connectors • Terminators • NIC. • T-Connectors are used to provide connection from the bus link to a workstation. • NIC (Network Interface Card) is used to link a workstation with the network. • Barrel Connectors are used to connect two parts of a cable either broken or when additional wireisrequired. • Terminators areused for Termination purpose. • Basically Thin Coaxial Cableisused in thistopology.
  • 10. BUs TOpOLOgy (CONT.) • Uses: • It is often used when network installation is small, simply or temporary. • Busisapassivetopology, • i.e. no activeelectron isused to amplify thesignal.
  • 11. Bus Topology (ConT.) • WORKING: • Broadcast network • all the computers on the network receive the information, but only one computer (the one with the address that matches the oneencoded in themessage) acceptstheinformation. Therest disregardsthemessage. • Protocol used is CSMA/CD (Carrier Sense Multiple Access with Collision Detection), • i.e. only one device can transmit the data at a time. More than one signal introduces collision. It means if one computer sends a signal over the bus; the other computer must wait for sometime.
  • 12. Bus Topology (ConT.) Another important issuein busnetwork istermination. Without termination, when thesignal reachestheend of the wire, it bounces back and travels back up the wire which makesthenetwork busy. To stop the bouncing signal, we attach terminators at either end of segment. The terminator absorbs the electrical energy and stops the reflection. Example ○ Ethernet10Base2, 10Base5, and ARC Net.
  • 13. Bus Topology (ConT.) • ADVANTAGES • popular because its working requirements are comparatively simple, and growth is accomplished easily and quickly. • Easy to useand understand. • It isreliablein small networks. • Repeater can beused to extend thenetwork. • It requiresleast amount of cable. • It islessexpensivein cost.
  • 14. Bus Topology (ConT.) • DISADVANTAGES • Heavy network traffic can slow the Bus, considerably (morecollision, morewaiting time). • Each BNC Barrel connecter weakens the signals as it absorbsenergy for itsown charge. • Difficult to troubleshoot and maintain because of cable break, looseconnector, and malfunctioning computer. • Singlecomputer failuredisturbsthewholenetwork. • Not a good choice for large organizations, because of slow datatraffic.
  • 16. Mesh Topology (ConT.) • In a mesh topology, every device has a dedicated point-to-point link to every other device. • The term dedicated means that the link carries traffic only between thetwo devicesit connects. • Primarily used in networksthat aremostly not LANs. • Madeup of multiplepoint to point connections. • Mesh networks can get complicated very quickly, because many connectionsmust bemanaged in anetwork of any size. • Mesh topology haveredundant linksbetween devices. • Each workstation is connected with a multi-port device like HUB that broadcaststhedata. • Therearetwo typesof Mesh, i.e. • TrueMesh • HybridMesh
  • 17. Mesh Topology (ConT.) • TRUEMESH • A true Mesh has a link between each device in the network. • It meansthat network isfully connected. • A true mesh of six devices requires fifteen connections (5 x 6)/2 = 15 links and that for seven devices requires 21 links. • The formula for finding total links in a true mesh is [n * (n– 1)] /2, wherenistotal number of workstations.
  • 18. Mesh Topology (ConT.) • HYBRIDMESH • Hybrid Mesh has extra links but not fully connected. Most Mesh topology networks are Hybrid Mesh networks.
  • 19. links and porTs in Mesh Topology • Number of Linksrequired to connect ‘n’ devices: n(n-1)/2 • Number of I/O Ports: n-1 • In figureabove, wehave5 Nodes, therefore: • No. of Links= 5(5-1)/2 = 10 • No. of I/O Ports= 5-1 = 4
  • 20. Mesh Topology (ConT.) • ADVANTAGES • Each dedicated connection can carry its own data load, thuseliminating thetraffic problems. • It is robust. If one link becomes unusable, it does not incapacitatetheentiresystem. • privacy or security. Physical boundaries prevent other usersfrom gaining accessto messages. • Point-to-point links make fault identification and fault isolation easy.
  • 21. Mesh Topology (ConT.) • DISADVANTAGES: • Amount of cabling and thenumber of I/O portsrequired • Installation and reconnection aredifficult. • The sheer bulk of the wiring can be greater than the available space (in walls, ceilings, or floors) can accommodate. • The hardware required to connect each link (I/O ports and cable) can beprohibitively expensive.
  • 23. sTar Topology (ConT.) • Most commonly used network topology • STRUCTURE: • Each device has a dedicated point-to-point link only to a central controller, usually called ahub or switch. • Thedevicesarenot directly linked to oneanother. • Unlike a mesh topology, a star topology does not allow direct traffic between devices. • The controller acts as an exchange: If one device wants to send data to another, it sends the data to the controller, which then relaysthedatato theother connected device.
  • 24. sTar Topology (ConT.) • WORKING: • Each computer on star network communicates with a Hub, that resend the message either to all computers which is called Broadcasting Star or only to the destination nodewhich iscalled Switched Star. • Now-a-daysmost of Switched Star networksuseSwitches instead of Intelligent Hubs because switches are less expensivethan Intelligent hubs.
  • 25. sTar Topology (ConT.) • ADVANTAGES: • Easy modification and expansion, without disturbing rest of the network. • Singlecomputer failuredoesnot affect thewholenetwork. • Support of several cablestypesin thesamenetwork. • Most flexibleof thethreetopologiesand easiest to diagnose. • It islessexpensivethan amesh topology. • Each device needs only one link and one I/O port to connect it to any number of others. • Thisfactor also makesit easy to install and reconfigure. • Far lesscabling needed ascompareto mesh topology. • Robustness. If one link fails, only that link is affected. All other links remain active. This factor also lends itself to easy fault identification and fault isolation.
  • 26. sTar Topology (ConT.) • DISADVANTAGES: • Dependency of the whole topology on one single point, thehub. If thehub goesdown, thewholesystem isdead. • More cables are required as compare to Bus and Ring topology and also Hub isexpensive.
  • 28. rIng TopologyrIng Topology • Each device has a dedicated point-to-point connection with only thetwo deviceson either sideof it. • A signal is passed along the ring in one direction, from device to device, until it reachesitsdestination. • Each device in the ring incorporates a repeater. When a device receives a signal intended for another device, its repeater regeneratesthebitsand passesthem along • Cable may be Coaxial with connectors or may be twisted pair with aHUB. Commonly Twisted Pair cableisused. • Thereisno termination becausethereisno end to thering.
  • 30. rIng Topology • Working: • For data transmission, medium access is required that is done by Token and thetechniqueisknown asToken Passing. • Token is a short message that is passed around the ring until a computer wishes to sends information to another computer, That computer modifies thetoken, addsan electronic address& data, and sendsit around thering. • Each computer in sequence receives the token and the information and passes them to the next computer until either the electronic address matches the address of a computer or the token returns to its origin. The receiving computer returns a message to the originator indicating that the messagehasbeen received. • The sending computer then creates the token and begins transmitting. The token circulatesuntil astation isready to send and capturesthetoken.
  • 31. RING TOPOLOGY • This all happens very quickly, a token can circle a ring 200 meters in diameter at about 10,000 times a second. Some faster networkscirculateseveral tokensat once. • Transmitted data moves in clockwise direction therefore there isno chanceof collision. • Example: FDDI is a fast fiber-optic network based on the ring topology. Token ring isanother ring based network.
  • 32. RING TOPOLOGYRING TOPOLOGY • ADVANTAGES: • It eliminates LANs depending on a central computer by distributing someof thecentral systemsresponsibility to all theother connected workstation. • Every workstation on the ring listens to see if the network is clear before sending a message. This helps avoiding collision between themessages. • The network degrades gracefully as more users we added i.e. thenetwork doesn’t failed.
  • 33. RING TOPOLOGYRING TOPOLOGY • DISADVANTAGES: • Failure of one computer on the ring can affect the whole network. • Also difficult to troubleshoot. • Adding or removing nodesdisturb thenetwork.
  • 35. hYbRId TOPOLOGY:hYbRId TOPOLOGY: a sTaR backbONe wITh ThRee bus NeTwORksa sTaR backbONe wITh ThRee bus NeTwORks
  • 36. summaRYsummaRY • Physical Structureof Network • Physical Topologies 1. Bus 2. Mesh 3. Star 4. Ring 5. Tree 6. Hybrid
  • 37. suGGesTed ReadINGsuGGesTed ReadING • Section – 1.2 • “Data Communications and Networking” 4th Edition by Behrouz A. Forouzan