SlideShare a Scribd company logo
1 of 22
Introduction to Computer
Lecture # 14
Course Instructor : Sehrish Rafiq
Department Of Computer Science
University Of Peshawar
Lecture overview
 Topology
 Mesh
 Star
 Tree
 Ring
 Bus
Topology
 The term topology refers to the way a network is laid out, either
physically or logically.
 Two or more devices connect to a link.
 Two or more links form a topology.
 The topology of a network is the geometric representation of the
relationship of all the links and linking devices(usually called nodes)
to each other.
 The topology describes that how the devices in a network are
interconnected rather than their physical arrangement.
Continued…
 A consideration when choosing a topology is the relative status of the
devices to be linked.
 Two relationships are possible.
Peer-to-Peer: where the devices share the link equally.
Primary-Secondary: where one device controls traffic and the others
can transmit through it.
 Five basic topologies
 Bus
 Star
 Mesh
 Tree
 Ring
 Note: Ring & Mesh topologies are more convenient for Peer-to-Peer transmission while
star & Tree topologies are better for primary–secondary transmission. A bus topology is
convenient for either.
Mesh topology
Mesh Topology
 In mesh topology every device has a dedicated point-to-point
link to every other device.
 The term dedicated means that the link carries traffic only
between the two devices it connects.
 A fully connected mesh network has n(n-1)/2 physical channels
to link n devices and every device must have n-1 I/O ports.
Advantages & Disadvantages
 Advantages:
 Each connection can carry its own data load.
 This topology is robust. If one link becomes unusable, it does not affect the entire
system.
 Privacy or security
 Easy fault identification.
 Disadvantages:
 Large amount of cabling & I/O ports are required.
 Installation & reconfiguration are difficult because every device must be connected
to every other device.
 The bulk of wiring can be greater than the available space( in walls, ceilings or
floors) can accommodate.
 The hardware(I/O ports & cabling) required to make a fully connected mesh network
can be prohibitively expensive.
Star Topology
 Each device has a dedicated point-to-point link only to a central
controller usually called a hub.
 The devices are not directly connected to each other.
 Like mesh a star topology does not allow direct traffic between
devices.
Continued…
 If one device wants to send data to another, It sends data to the
controller which then relays the data to the other connected device.
 Usually two types of Hubs are available.
 Passive Hub
 Active Hub
Types of Hubs
 Passive Hub:
 A passive Hub is used to connect computers in a broadcast network.
 The signal sent to a passive hub is sent to all workstations without any
regeneration or amplification.
 Passive hubs do not require any external power source.
 Active Hub:
 An active hub uses an external power source and regenerates the signal,
therefore greater cable distances are allowed.
 A switched hub directs the signal directly to the recipient.
 Active hubs also contain diagnostic features to aid in network trouble
shooting.
 Active Hub is more expensive than a passive Hub.
Advantages & Disadvantages
 Advantages
 A star topology is less expensive than a mesh topology.
 Each device needs only one cable and one I/O port to connect with any number of
devices.
 Easy to install and easy to reconfigure.
 Far less cabling is required therefore space problems are rare.
 Addition, deletions and moves involve only one connection between that device and
hub.
 If a link fails only that link is affected.
 Easy fault identification & fault isolation because of central Hub.
 Disadvantages
 More cabling than any other topology(such as bus, ring or tree ) except Mesh
because every device must be connected to the central hub.
 Active hub is expensive.
 A central hub failure can damage the whole network.
Tree Topology
Tree Topology
 A variation of star topology.
 As in star, nodes in a tree are linked to a central Hub that controls
the traffic to the Network.
 However, not every device is directly plugged in to the central Hub.
 The majority of the devices connect to a secondary Hub that in turn
is connected to the central Hub.
 The central Hub in the tree is an active Hub.
Continued…
 An active Hub contains a repeater which is a hardware device that
regenerates the received bit patterns before sending them out.
 Repeating strengthens transmissions and increases the distance a
signal can travel.
 The secondary Hubs may be active or passive hubs.
 A passive Hub provides a simple physical connection between the
attached devices.
Advantages & Disadvantages
 The advantages and disadvantages of tree are almost the same to
that of star.
 However, because of the addition of secondary Hubs more devices
can be connected with the central Hub and can increase the
distance a signal can travel.
 It allows the network to isolate and prioritize communications from
different computers.
 By means of prioritizing, the network designers and operator can
guarantee that time-sensitive data will not have to wait for access to
the network.
Bus Topology
 A Bus topology is a multipoint.
 One long cable acts as a backbone to link all the devices in a
network.
 Nodes are connected to the bus cable by drop lines and taps.
 A drop line is a connection running between the device and the
main cable.
 A tap is a connector that either splices in to the main cable or
punctures the sheathing of a cable to create a contact with the
metallic core.
Continued…
 As a signal travels along the back-bone, some of its energy is
transformed in to heat.
 Therefore it becomes weaker and weaker.
 For this reason there is a limit on the number of taps a bus can
support and on the distance between those taps.
Advantages & Disadvantages
 Advantages:
 Ease of installation.
 Less cabling than mesh, star or tree.
 Only one backbone cable stretches through the entire facility.
 For n devices to connect only one backbone cable and n drop lines are needed.
 Disadvantages:
 Difficult reconfiguration and fault isolation.
 It can be difficult to add new devices.
 Signal reflection problem.
 Adding new devices may require replacement of the backbone.
 A fault in backbone can damage the entire network causing noise problems in both
directions.
Ring Topology
 In ring topology every device has a dedicated point to point line
configuration only with the two devices on either side of it.
 A signal is passed along the ring in one direction from device to
device until it reaches its destination.
 Each device in the ring incorporates a repeater.
 Token passing is frequently used in ring topology.
Advantages & Disadvantages
 Advantages:
 Easy to install and easy to reconfigure.
 Adding and deleting a device only involves two connections.
 Easy fault isolation.
 If one device does not receive a signal within a specified period, it can issue an
alarm.
 Disadvantage:
 Uni-directional traffic.
 A break in a ring can disable the entire network.
 This weakness can be solved by a dual ring.
Hybrid Topologies
 Often a network combines several topologies as sub-networks
linked together in a large topology.
 For example, one department of a business may have decided to
use a bus topology while another department has a ring.
 All can be connected with a central controller in a star topology.
Introduction to Computers Lecture # 14

More Related Content

What's hot

network hardware
network hardwarenetwork hardware
network hardwaretumetr1
 
Data communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesData communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesMSA Technosoft
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabhaSuprabha Sahoo
 
Presentation on computer networking
Presentation on computer networkingPresentation on computer networking
Presentation on computer networkingJyoti Tewari
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkRutwik Jadhav
 
Data communication and computer networks
Data communication and computer networksData communication and computer networks
Data communication and computer networksmarwa_ma
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingKhan Rahimeen
 
Presentation on data communication
Presentation on data communicationPresentation on data communication
Presentation on data communicationHarpreet Dhaliwal
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networksHaider Ali Malik
 
Data Communication Networks
Data Communication NetworksData Communication Networks
Data Communication NetworksYash Gupta
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12LakshyaT
 
Data com chapter 1 introduction
Data com chapter 1   introductionData com chapter 1   introduction
Data com chapter 1 introductionAbdul-Hamid Donde
 
types of computer networks, protocols and standards
types of computer networks, protocols and standardstypes of computer networks, protocols and standards
types of computer networks, protocols and standardsMidhun Menon
 
introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networkingSithu PM
 
Data communication and network
Data communication and networkData communication and network
Data communication and networkHardik Patel
 

What's hot (20)

network hardware
network hardwarenetwork hardware
network hardware
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Data communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesData communication and computer networks | Network Topologies
Data communication and computer networks | Network Topologies
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabha
 
Presentation on computer networking
Presentation on computer networkingPresentation on computer networking
Presentation on computer networking
 
Network devices
Network devicesNetwork devices
Network devices
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Data communication and computer networks
Data communication and computer networksData communication and computer networks
Data communication and computer networks
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Presentation on data communication
Presentation on data communicationPresentation on data communication
Presentation on data communication
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
Data Communication Networks
Data Communication NetworksData Communication Networks
Data Communication Networks
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
 
Data com chapter 1 introduction
Data com chapter 1   introductionData com chapter 1   introduction
Data com chapter 1 introduction
 
types of computer networks, protocols and standards
types of computer networks, protocols and standardstypes of computer networks, protocols and standards
types of computer networks, protocols and standards
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
networking
networkingnetworking
networking
 
introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networking
 
Data communication and network
Data communication and networkData communication and network
Data communication and network
 

Similar to Introduction to Computers Lecture # 14

Network Topology In Computer Network 6-Types of topologies.pdf
Network Topology In Computer Network  6-Types of topologies.pdfNetwork Topology In Computer Network  6-Types of topologies.pdf
Network Topology In Computer Network 6-Types of topologies.pdfsunil shukla
 
Network topology
Network topologyNetwork topology
Network topologyStudent
 
Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01Sayyed Nawaz
 
Topology munsifullah daudzaikhurasan university
Topology munsifullah daudzaikhurasan university Topology munsifullah daudzaikhurasan university
Topology munsifullah daudzaikhurasan university Munsif Ullah
 
COMPUTER NETWORK TOPOLOGY
COMPUTER NETWORK TOPOLOGY COMPUTER NETWORK TOPOLOGY
COMPUTER NETWORK TOPOLOGY Sayma Sultana
 
Presentation on topology by kalyan kk
Presentation on topology by kalyan kkPresentation on topology by kalyan kk
Presentation on topology by kalyan kkkalyan kumar
 
Presentation on topology
Presentation on topologyPresentation on topology
Presentation on topologykalyan kumar
 
Network topology
Network topologyNetwork topology
Network topologyArjonDando1
 
Network Topologies in computer networking
Network Topologies in computer networkingNetwork Topologies in computer networking
Network Topologies in computer networkingnazmulabdal
 
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxSuratSingh18
 
Networktopology xii
Networktopology xiiNetworktopology xii
Networktopology xiisaltyp
 
Types of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterTypes of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterAlidHasan4
 
Network topology
Network topologyNetwork topology
Network topologylekshmik
 

Similar to Introduction to Computers Lecture # 14 (20)

Network Topology In Computer Network 6-Types of topologies.pdf
Network Topology In Computer Network  6-Types of topologies.pdfNetwork Topology In Computer Network  6-Types of topologies.pdf
Network Topology In Computer Network 6-Types of topologies.pdf
 
Network topology
Network topologyNetwork topology
Network topology
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
 
Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01
 
Network topology
Network topologyNetwork topology
Network topology
 
Topology munsifullah daudzaikhurasan university
Topology munsifullah daudzaikhurasan university Topology munsifullah daudzaikhurasan university
Topology munsifullah daudzaikhurasan university
 
COMPUTER NETWORK TOPOLOGY
COMPUTER NETWORK TOPOLOGY COMPUTER NETWORK TOPOLOGY
COMPUTER NETWORK TOPOLOGY
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Presentation on topology by kalyan kk
Presentation on topology by kalyan kkPresentation on topology by kalyan kk
Presentation on topology by kalyan kk
 
Presentation on topology
Presentation on topologyPresentation on topology
Presentation on topology
 
report.pptx
report.pptxreport.pptx
report.pptx
 
Topology
Topology Topology
Topology
 
Network topology
Network topologyNetwork topology
Network topology
 
Network Topologies in computer networking
Network Topologies in computer networkingNetwork Topologies in computer networking
Network Topologies in computer networking
 
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
 
Networktopology xii
Networktopology xiiNetworktopology xii
Networktopology xii
 
Types of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterTypes of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouter
 
Topology
TopologyTopology
Topology
 
Network topology
Network topologyNetwork topology
Network topology
 
Network topology
Network topologyNetwork topology
Network topology
 

More from Sehrish Rafiq

Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Sehrish Rafiq
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Sehrish Rafiq
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Sehrish Rafiq
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Sehrish Rafiq
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Sehrish Rafiq
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Sehrish Rafiq
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Sehrish Rafiq
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Sehrish Rafiq
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Sehrish Rafiq
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Sehrish Rafiq
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Sehrish Rafiq
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Sehrish Rafiq
 

More from Sehrish Rafiq (20)

Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16
 
Lecture 24
Lecture 24Lecture 24
Lecture 24
 
Lecture 18
Lecture 18Lecture 18
Lecture 18
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 

Recently uploaded

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Introduction to Computers Lecture # 14

  • 1. Introduction to Computer Lecture # 14 Course Instructor : Sehrish Rafiq Department Of Computer Science University Of Peshawar
  • 2. Lecture overview  Topology  Mesh  Star  Tree  Ring  Bus
  • 3. Topology  The term topology refers to the way a network is laid out, either physically or logically.  Two or more devices connect to a link.  Two or more links form a topology.  The topology of a network is the geometric representation of the relationship of all the links and linking devices(usually called nodes) to each other.  The topology describes that how the devices in a network are interconnected rather than their physical arrangement.
  • 4. Continued…  A consideration when choosing a topology is the relative status of the devices to be linked.  Two relationships are possible. Peer-to-Peer: where the devices share the link equally. Primary-Secondary: where one device controls traffic and the others can transmit through it.  Five basic topologies  Bus  Star  Mesh  Tree  Ring  Note: Ring & Mesh topologies are more convenient for Peer-to-Peer transmission while star & Tree topologies are better for primary–secondary transmission. A bus topology is convenient for either.
  • 6. Mesh Topology  In mesh topology every device has a dedicated point-to-point link to every other device.  The term dedicated means that the link carries traffic only between the two devices it connects.  A fully connected mesh network has n(n-1)/2 physical channels to link n devices and every device must have n-1 I/O ports.
  • 7. Advantages & Disadvantages  Advantages:  Each connection can carry its own data load.  This topology is robust. If one link becomes unusable, it does not affect the entire system.  Privacy or security  Easy fault identification.  Disadvantages:  Large amount of cabling & I/O ports are required.  Installation & reconfiguration are difficult because every device must be connected to every other device.  The bulk of wiring can be greater than the available space( in walls, ceilings or floors) can accommodate.  The hardware(I/O ports & cabling) required to make a fully connected mesh network can be prohibitively expensive.
  • 8. Star Topology  Each device has a dedicated point-to-point link only to a central controller usually called a hub.  The devices are not directly connected to each other.  Like mesh a star topology does not allow direct traffic between devices.
  • 9. Continued…  If one device wants to send data to another, It sends data to the controller which then relays the data to the other connected device.  Usually two types of Hubs are available.  Passive Hub  Active Hub
  • 10. Types of Hubs  Passive Hub:  A passive Hub is used to connect computers in a broadcast network.  The signal sent to a passive hub is sent to all workstations without any regeneration or amplification.  Passive hubs do not require any external power source.  Active Hub:  An active hub uses an external power source and regenerates the signal, therefore greater cable distances are allowed.  A switched hub directs the signal directly to the recipient.  Active hubs also contain diagnostic features to aid in network trouble shooting.  Active Hub is more expensive than a passive Hub.
  • 11. Advantages & Disadvantages  Advantages  A star topology is less expensive than a mesh topology.  Each device needs only one cable and one I/O port to connect with any number of devices.  Easy to install and easy to reconfigure.  Far less cabling is required therefore space problems are rare.  Addition, deletions and moves involve only one connection between that device and hub.  If a link fails only that link is affected.  Easy fault identification & fault isolation because of central Hub.  Disadvantages  More cabling than any other topology(such as bus, ring or tree ) except Mesh because every device must be connected to the central hub.  Active hub is expensive.  A central hub failure can damage the whole network.
  • 13. Tree Topology  A variation of star topology.  As in star, nodes in a tree are linked to a central Hub that controls the traffic to the Network.  However, not every device is directly plugged in to the central Hub.  The majority of the devices connect to a secondary Hub that in turn is connected to the central Hub.  The central Hub in the tree is an active Hub.
  • 14. Continued…  An active Hub contains a repeater which is a hardware device that regenerates the received bit patterns before sending them out.  Repeating strengthens transmissions and increases the distance a signal can travel.  The secondary Hubs may be active or passive hubs.  A passive Hub provides a simple physical connection between the attached devices.
  • 15. Advantages & Disadvantages  The advantages and disadvantages of tree are almost the same to that of star.  However, because of the addition of secondary Hubs more devices can be connected with the central Hub and can increase the distance a signal can travel.  It allows the network to isolate and prioritize communications from different computers.  By means of prioritizing, the network designers and operator can guarantee that time-sensitive data will not have to wait for access to the network.
  • 16. Bus Topology  A Bus topology is a multipoint.  One long cable acts as a backbone to link all the devices in a network.  Nodes are connected to the bus cable by drop lines and taps.  A drop line is a connection running between the device and the main cable.  A tap is a connector that either splices in to the main cable or punctures the sheathing of a cable to create a contact with the metallic core.
  • 17. Continued…  As a signal travels along the back-bone, some of its energy is transformed in to heat.  Therefore it becomes weaker and weaker.  For this reason there is a limit on the number of taps a bus can support and on the distance between those taps.
  • 18. Advantages & Disadvantages  Advantages:  Ease of installation.  Less cabling than mesh, star or tree.  Only one backbone cable stretches through the entire facility.  For n devices to connect only one backbone cable and n drop lines are needed.  Disadvantages:  Difficult reconfiguration and fault isolation.  It can be difficult to add new devices.  Signal reflection problem.  Adding new devices may require replacement of the backbone.  A fault in backbone can damage the entire network causing noise problems in both directions.
  • 19. Ring Topology  In ring topology every device has a dedicated point to point line configuration only with the two devices on either side of it.  A signal is passed along the ring in one direction from device to device until it reaches its destination.  Each device in the ring incorporates a repeater.  Token passing is frequently used in ring topology.
  • 20. Advantages & Disadvantages  Advantages:  Easy to install and easy to reconfigure.  Adding and deleting a device only involves two connections.  Easy fault isolation.  If one device does not receive a signal within a specified period, it can issue an alarm.  Disadvantage:  Uni-directional traffic.  A break in a ring can disable the entire network.  This weakness can be solved by a dual ring.
  • 21. Hybrid Topologies  Often a network combines several topologies as sub-networks linked together in a large topology.  For example, one department of a business may have decided to use a bus topology while another department has a ring.  All can be connected with a central controller in a star topology.