The document discusses various physical network topologies including bus, mesh, star, ring, tree, and hybrid. It provides detailed descriptions of how each topology is structured and how data is transmitted. For example, it explains that a bus topology uses a single cable as a backbone to connect all devices and that collisions can occur when multiple devices transmit simultaneously. The document also compares advantages and disadvantages of the different topologies.
This topic is related to computer network in these topic How the computers are communicate each other through the different connections and the data transfer between them.The adavantages and disadvantages of these topologies..
Esoft Metro Campus - Diploma in Information Technology - (Module IV) Fundamentals in Networking
(Template - Virtusa Corporate)
Contents:
What is a computer network?
Types of computer networks
Personal Area Network
Local Area Network
Metropolitan Area Network
Wide Area Network
Networking Topologies
Physical Topologies
Physical Point to Point
Physical Bus Topology
Physical Ring Topology
Physical Star Topology
Physical Mesh Topology
Physical Tree Topology
Physical Hybrid topology
Logical Topologies
Ethernet
Local Talk
Token Ring
FDDI
ATM
Transmission Media
Networking Cables
Coaxial Cables
Twisted Pair Cables
Fiber Optic Cables
Network Devices
NIC-Network interface card
Hub
Network Switch
Router
Bridge
IP Address
Activities
This topic is related to computer network in these topic How the computers are communicate each other through the different connections and the data transfer between them.The adavantages and disadvantages of these topologies..
Esoft Metro Campus - Diploma in Information Technology - (Module IV) Fundamentals in Networking
(Template - Virtusa Corporate)
Contents:
What is a computer network?
Types of computer networks
Personal Area Network
Local Area Network
Metropolitan Area Network
Wide Area Network
Networking Topologies
Physical Topologies
Physical Point to Point
Physical Bus Topology
Physical Ring Topology
Physical Star Topology
Physical Mesh Topology
Physical Tree Topology
Physical Hybrid topology
Logical Topologies
Ethernet
Local Talk
Token Ring
FDDI
ATM
Transmission Media
Networking Cables
Coaxial Cables
Twisted Pair Cables
Fiber Optic Cables
Network Devices
NIC-Network interface card
Hub
Network Switch
Router
Bridge
IP Address
Activities
Learn the basics of DNN module development. See how to get your module started, what DotNetNuke provides you as a developer, and some of the ins and outs of writing code for DotNetNuke. Starting basically from scratch, we will examine what is required from DotNetNuke modules, and what DotNetNuke offers that you won't want to miss. Presented by Brian Dukes of Engage Software.
Download Complete Material - https://www.instamojo.com/prashanth_ns/
This VB.Net 4.0 with ADO.NET Programming contains 15 Units and each unit contains 40 to 60 slides in it.
Contents…
• Appreciate the Graphical User Interface (GUI)
• Identify the controls of GUI
• Identify the features of .NET Framework
• Use Windows project by using Visual Studio .NET integrated development environment
• Work with Windows Forms and Controls
• Perform drag-and-drop operations using clipboard
• Validate user input using controls and events
• Work with the CommonDialog class
• Create a custom dialog box
• Work with menus and MDI applications
• Work with ToolStrip control
• Identify the functionality of print components
• Identify the functionality of Crystal Reports
• Implement accessibility features in a .NET application
• Identify features of international applications
• Implement globalization and localization in a .NET application
• Create a help system using HTML Workshop
• Implement help system in .NET applications
• Work with built-in components in the .NET applications
• Work with user-defined components in the .NET applications
• Implement asynchronous programming
• Use the BackgroundWorker component
• Implement assemblies
• Implement various deployment strategies
• Use various editors in a deployment project
• Implement ClickOnce
• Configure and Secure a Windows application
ADO.NET 4.0 Architecture
• Work with XML
• Work with SQL queries
• Implement data binding to display values on the controls of a Windows form
• Filter the data to display the selected records
• Identify the connected and disconnected environment in ADO.NET
• Working in a connected environment
• Working in a disconnected environment
The world is adopting the new technology the need of ethics arises to sustain the proper growth and to minimize the risk of wrong uses. As technology is growing good if it is in proper hands but goes totally wrong in wrong hands.
Business plan for " A CHILDCARE CENTER IN PESHAWAR"diaryinc
Business plan for " A CHILDCARE CENTER IN PESHAWAR" FULL PLAN WITH DETAIL OF FINANCIAL STATEMENT AND THE MARKETING, MANAGERIAL STRATEGIES REQUIRE FOR THE PLAN.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
3. OvervIew Of LeCTUre 3OvervIew Of LeCTUre 3
• Physical Structureof Network
• Physical Topologies
1. Bus
2. Mesh
3. Star
4. Ring
5. Tree
6. Hybrid
4. TOpOLOgy
“The Topology is the geometric
representation of the relationship of
the links and linking devices”
OR
“Topology defines physical or logical
arrangement of links in a Network”
5. TOpOLOgy (CONT.)
• The ways in which the wires can be run in the network
to link with thecomputer.
• The ways in which the connections are made in the
network.
• Simply Thephysical layout of thenetwork.
8. BUs TOpOLOgy (CONT.)
• Structure
• A bustopology, ismultipoint.
• Onelong cableactsasabackboneto link all thedevicesin anetwork.
• Nodesareconnected to thebuscableby drop linesand taps.
• A drop line is a connection running between the device and the main
cable.
• A tap is a connector that either splices into the main cable or punctures
thesheathing of acableto createacontact with themetallic core.
• As a signal travels along the backbone, some of its energy is transformed
into heat. Therefore, it becomes weaker and weaker as it travels farther
and farther. For this reason there is a limit on the number of taps a bus
can support and on thedistancebetween thosetaps.
9. BUs TOpOLOgy (CONT.)
• In abusnetwork every workstation needs
• BNC Barrel Connectors
• T-Connectors
• Terminators
• NIC.
• T-Connectors are used to provide connection from the bus link to a
workstation.
• NIC (Network Interface Card) is used to link a workstation with the
network.
• Barrel Connectors are used to connect two parts of a cable either broken
or when additional wireisrequired.
• Terminators areused for Termination purpose.
• Basically Thin Coaxial Cableisused in thistopology.
10. BUs TOpOLOgy (CONT.)
• Uses:
• It is often used when network installation is small, simply
or temporary.
• Busisapassivetopology,
• i.e. no activeelectron isused to amplify thesignal.
11. Bus Topology (ConT.)
• WORKING:
• Broadcast network
• all the computers on the network receive the information, but
only one computer (the one with the address that matches the
oneencoded in themessage) acceptstheinformation. Therest
disregardsthemessage.
• Protocol used is CSMA/CD (Carrier Sense Multiple Access
with Collision Detection),
• i.e. only one device can transmit the data at a time. More than
one signal introduces collision. It means if one computer
sends a signal over the bus; the other computer must wait for
sometime.
12. Bus Topology (ConT.)
Another important issuein busnetwork istermination.
Without termination, when thesignal reachestheend of the
wire, it bounces back and travels back up the wire which
makesthenetwork busy.
To stop the bouncing signal, we attach terminators at either
end of segment.
The terminator absorbs the electrical energy and stops the
reflection.
Example
○ Ethernet10Base2, 10Base5, and ARC Net.
13. Bus Topology (ConT.)
• ADVANTAGES
• popular because its working requirements are
comparatively simple, and growth is accomplished easily
and quickly.
• Easy to useand understand.
• It isreliablein small networks.
• Repeater can beused to extend thenetwork.
• It requiresleast amount of cable.
• It islessexpensivein cost.
14. Bus Topology (ConT.)
• DISADVANTAGES
• Heavy network traffic can slow the Bus, considerably
(morecollision, morewaiting time).
• Each BNC Barrel connecter weakens the signals as it
absorbsenergy for itsown charge.
• Difficult to troubleshoot and maintain because of cable
break, looseconnector, and malfunctioning computer.
• Singlecomputer failuredisturbsthewholenetwork.
• Not a good choice for large organizations, because of
slow datatraffic.
16. Mesh Topology (ConT.)
• In a mesh topology, every device has a dedicated point-to-point
link to every other device.
• The term dedicated means that the link carries traffic only
between thetwo devicesit connects.
• Primarily used in networksthat aremostly not LANs.
• Madeup of multiplepoint to point connections.
• Mesh networks can get complicated very quickly, because many
connectionsmust bemanaged in anetwork of any size.
• Mesh topology haveredundant linksbetween devices.
• Each workstation is connected with a multi-port device like HUB
that broadcaststhedata.
• Therearetwo typesof Mesh, i.e.
• TrueMesh
• HybridMesh
17. Mesh Topology (ConT.)
• TRUEMESH
• A true Mesh has a link between each device in the
network.
• It meansthat network isfully connected.
• A true mesh of six devices requires fifteen connections (5
x 6)/2 = 15 links and that for seven devices requires 21
links.
• The formula for finding total links in a true mesh is [n *
(n– 1)] /2, wherenistotal number of workstations.
18. Mesh Topology (ConT.)
• HYBRIDMESH
• Hybrid Mesh has extra links but not fully connected.
Most Mesh topology networks are Hybrid Mesh
networks.
19. links and porTs in Mesh
Topology
• Number of Linksrequired to connect ‘n’ devices: n(n-1)/2
• Number of I/O Ports: n-1
• In figureabove, wehave5 Nodes, therefore:
• No. of Links= 5(5-1)/2 = 10
• No. of I/O Ports= 5-1 = 4
20. Mesh Topology (ConT.)
• ADVANTAGES
• Each dedicated connection can carry its own data load,
thuseliminating thetraffic problems.
• It is robust. If one link becomes unusable, it does not
incapacitatetheentiresystem.
• privacy or security. Physical boundaries prevent other
usersfrom gaining accessto messages.
• Point-to-point links make fault identification and fault
isolation easy.
21. Mesh Topology (ConT.)
• DISADVANTAGES:
• Amount of cabling and thenumber of I/O portsrequired
• Installation and reconnection aredifficult.
• The sheer bulk of the wiring can be greater than the
available space (in walls, ceilings, or floors) can
accommodate.
• The hardware required to connect each link (I/O ports and
cable) can beprohibitively expensive.
23. sTar Topology (ConT.)
• Most commonly used network topology
• STRUCTURE:
• Each device has a dedicated point-to-point link only to a
central controller, usually called ahub or switch.
• Thedevicesarenot directly linked to oneanother.
• Unlike a mesh topology, a star topology does not allow
direct traffic between devices.
• The controller acts as an exchange: If one device wants to
send data to another, it sends the data to the controller,
which then relaysthedatato theother connected device.
24. sTar Topology (ConT.)
• WORKING:
• Each computer on star network communicates with a
Hub, that resend the message either to all computers
which is called Broadcasting Star or only to the
destination nodewhich iscalled Switched Star.
• Now-a-daysmost of Switched Star networksuseSwitches
instead of Intelligent Hubs because switches are less
expensivethan Intelligent hubs.
25. sTar Topology (ConT.)
• ADVANTAGES:
• Easy modification and expansion, without disturbing rest of the
network.
• Singlecomputer failuredoesnot affect thewholenetwork.
• Support of several cablestypesin thesamenetwork.
• Most flexibleof thethreetopologiesand easiest to diagnose.
• It islessexpensivethan amesh topology.
• Each device needs only one link and one I/O port to connect it
to any number of others.
• Thisfactor also makesit easy to install and reconfigure.
• Far lesscabling needed ascompareto mesh topology.
• Robustness. If one link fails, only that link is affected. All other
links remain active. This factor also lends itself to easy fault
identification and fault isolation.
26. sTar Topology (ConT.)
• DISADVANTAGES:
• Dependency of the whole topology on one single point,
thehub. If thehub goesdown, thewholesystem isdead.
• More cables are required as compare to Bus and Ring
topology and also Hub isexpensive.
28. rIng TopologyrIng Topology
• Each device has a dedicated point-to-point connection with
only thetwo deviceson either sideof it.
• A signal is passed along the ring in one direction, from device
to device, until it reachesitsdestination.
• Each device in the ring incorporates a repeater. When a device
receives a signal intended for another device, its repeater
regeneratesthebitsand passesthem along
• Cable may be Coaxial with connectors or may be twisted pair
with aHUB. Commonly Twisted Pair cableisused.
• Thereisno termination becausethereisno end to thering.
30. rIng Topology
• Working:
• For data transmission, medium access is required that is done by Token
and thetechniqueisknown asToken Passing.
• Token is a short message that is passed around the ring until a computer
wishes to sends information to another computer, That computer modifies
thetoken, addsan electronic address& data, and sendsit around thering.
• Each computer in sequence receives the token and the information and
passes them to the next computer until either the electronic address
matches the address of a computer or the token returns to its origin. The
receiving computer returns a message to the originator indicating that the
messagehasbeen received.
• The sending computer then creates the token and begins transmitting. The
token circulatesuntil astation isready to send and capturesthetoken.
31. RING TOPOLOGY
• This all happens very quickly, a token can circle a ring 200
meters in diameter at about 10,000 times a second. Some
faster networkscirculateseveral tokensat once.
• Transmitted data moves in clockwise direction therefore there
isno chanceof collision.
• Example: FDDI is a fast fiber-optic network based on the
ring topology. Token ring isanother ring based network.
32. RING TOPOLOGYRING TOPOLOGY
• ADVANTAGES:
• It eliminates LANs depending on a central computer by
distributing someof thecentral systemsresponsibility to all
theother connected workstation.
• Every workstation on the ring listens to see if the network
is clear before sending a message. This helps avoiding
collision between themessages.
• The network degrades gracefully as more users we added
i.e. thenetwork doesn’t failed.
33. RING TOPOLOGYRING TOPOLOGY
• DISADVANTAGES:
• Failure of one computer on the ring can affect the whole
network.
• Also difficult to troubleshoot.
• Adding or removing nodesdisturb thenetwork.