SlideShare a Scribd company logo
Types of
network and
topologies
Arjun Katiyar
• A computer network is telecommunications network that allows
computer to exchange data.
• The physical connection between network computing devices is
established using either cable media or wireless media.
• The best known computer network is the internet.
Bases on the size and coverage area, network are characterized
in following types
• Personal area network (PAN)
• Local area network (LAN)
• Metropolitan area network (MAN)
• Wide area network (WAN)
Personal area network, or PAN, is a computer network that enables communication
between computer devices near a person.
• A personal area network (PAN) is a computer network used for communication among
computer and different information technological devices close to one person.
• A pan may include wired and wireless devices.
• The reach of a pan typically extends to 10 meters.
A local area network (LAN) is a collection of devices connected
together in one physical location, such as a building, office, or
home.
A local area network (LAN) is a network that connects
computers and devices in a limited geographical area such as
a home, school, office building, or closely positioned group of
buildings.
• Each computer or device on the network is a node.
• Wired LANs are most likely based on Ethernet technology.
A metropolitan area network (MAN) is a computer network
that connects computers within a metropolitan area, which
could be a single large city, multiple cities and towns, or any
given large area with multiple buildings.
• It is relatively larger than LAN and extends across city or a
metropolitan.
• It is created by connecting two or more LANs located at
different locations in a city.
A wide-area network is a computer network that connects
smaller networks.
• A wide area network (WAN) is a computer network that
covers a large geographic area such as a city, country, or
spans even intercontinental distances.
• A WAN uses a communications channel that combines
many types of media such as telephone lines, cables, and
air waves.
• A WAN often makes use of transmission facilities provided
by common carriers, such as telephone companies.
The arrangement of a network that comprises nodes and connecting lines via sender and
receiver is referred to as network topology.
A Network Topology is the arrangement with which computer systems or network devices
are connected to each other. Topologies may define both physical and logical aspect of the
network. Both logical and physical topologies could be same or different in a same network
• Bus Topology.
• Ring Topology.
• Star Topology.
• Mesh Topology.
• Tree Topology.
All devices share single communication line
or cable. Bus topology may have problem
while multiple hosts sending data at the
same time.
In ring topology, each host machine
connects to exactly two other machines,
creating a circular network structure.
All hosts in Star topology are connected to
a central device, known as hub device,
using a point-to-point connection.
In this type of topology, a host is connected
to one or multiple hosts.This topology has
hosts in point-to-point connection with every
other host or may also have hosts which are
in point-to-point connection to few hosts only.
Also known as Hierarchical Topology, this
is the most common form of network
topology in use presently. This topology
imitates as extended Star topology and
inherits properties of bus topology.
Main benefits of networks include:
File sharing - you can easily share data between different users, or access it remotely if you
keep it on other connected devices.
Resource sharing - using network-connected peripheral devices like printers, scanners and
copiers, or sharing software between multiple users, saves money.
Sharing a single internet connection - it is cost-efficient and can help protect your systems if
you properly secure the network.
Increasing storage capacity - you can access files and multimedia, such as images and music,
which you store remotely on other machines or network-attached storage devices.

More Related Content

What's hot

1 presentation copy
1 presentation   copy1 presentation   copy
1 presentation copyNikhil Mace
 
Types of computer network ...
Types of computer network ...Types of computer network ...
Types of computer network ...
shahbaz ahmad
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
Ruwan Dammika
 
Network
NetworkNetwork
Computer network
Computer network Computer network
Computer network
Gyan Jyoti Gogoi
 
PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.
satyamjipatel
 
Computer-Networks
Computer-NetworksComputer-Networks
Computer Network & Types
Computer Network & TypesComputer Network & Types
Computer Network & Types
Shefa Idrees
 
Computer network system (2)
Computer network system (2)Computer network system (2)
Computer network system (2)hanirahman16
 
Communication through computer networks
Communication through computer networksCommunication through computer networks
Communication through computer networks
Ivin Sebastian
 
Lecture 1 an introduction to computer networks
Lecture 1  an introduction to computer networksLecture 1  an introduction to computer networks
Lecture 1 an introduction to computer networksAmitava Nag
 
Different types of network
Different types of networkDifferent types of network
Different types of network
Aryan Saxena
 
Ccna presentation
Ccna presentationCcna presentation
Ccna presentation
puneet4321
 
Classification computer network
Classification computer networkClassification computer network
Classification computer network
MH Shihab
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
Manish Gupta
 
Computer communication and internet
Computer communication and internetComputer communication and internet
Computer communication and internet
eVidhya
 
Computer Networks - PPT
Computer Networks - PPTComputer Networks - PPT
Computer Networks - PPT
Dhivya T
 
Lan manwan
Lan manwanLan manwan
Lan manwan
Tabinda Lajward
 
Computer networking For Class XII
Computer networking For Class XIIComputer networking For Class XII
Computer networking For Class XII
Fernando Torres
 

What's hot (20)

1 presentation copy
1 presentation   copy1 presentation   copy
1 presentation copy
 
Types of computer network ...
Types of computer network ...Types of computer network ...
Types of computer network ...
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
 
Network
NetworkNetwork
Network
 
Computer network
Computer network Computer network
Computer network
 
PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.
 
Computer-Networks
Computer-NetworksComputer-Networks
Computer-Networks
 
Computer Network & Types
Computer Network & TypesComputer Network & Types
Computer Network & Types
 
Computer network system (2)
Computer network system (2)Computer network system (2)
Computer network system (2)
 
Communication through computer networks
Communication through computer networksCommunication through computer networks
Communication through computer networks
 
Lecture 1 an introduction to computer networks
Lecture 1  an introduction to computer networksLecture 1  an introduction to computer networks
Lecture 1 an introduction to computer networks
 
Different types of network
Different types of networkDifferent types of network
Different types of network
 
Ccna presentation
Ccna presentationCcna presentation
Ccna presentation
 
Networking
NetworkingNetworking
Networking
 
Classification computer network
Classification computer networkClassification computer network
Classification computer network
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
 
Computer communication and internet
Computer communication and internetComputer communication and internet
Computer communication and internet
 
Computer Networks - PPT
Computer Networks - PPTComputer Networks - PPT
Computer Networks - PPT
 
Lan manwan
Lan manwanLan manwan
Lan manwan
 
Computer networking For Class XII
Computer networking For Class XIIComputer networking For Class XII
Computer networking For Class XII
 

Similar to Network

network.pdf
network.pdfnetwork.pdf
network.pdf
LakshayTyagi28
 
COMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptxCOMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptx
Arti Parab Academics
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
Chandan Gupta Bhagat
 
Computer Networks .ppt
Computer Networks .pptComputer Networks .ppt
Computer Networks .ppt
AbdulRehman515971
 
Computer Networks 1 .ppt
Computer Networks 1 .pptComputer Networks 1 .ppt
Computer Networks 1 .ppt
AbdulRehman378540
 
Computer network
Computer networkComputer network
Computer network
Tawseef Rather
 
Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)
saurabh goel
 
Presentation-10.pptx
Presentation-10.pptxPresentation-10.pptx
Presentation-10.pptx
ShahinAhmed49
 
Basics of Computer Network
Basics of Computer NetworkBasics of Computer Network
Basics of Computer Network
sandipbanerjee49
 
Computer Networking.pptx
Computer Networking.pptxComputer Networking.pptx
Computer Networking.pptx
Ankita Shirke
 
info technology.pptx
info technology.pptxinfo technology.pptx
info technology.pptx
ssuser07362a
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKINGbwire sedrick
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
HardeepKaurCSEAssist
 
Computer Network Introduction full
Computer Network Introduction fullComputer Network Introduction full
Computer Network Introduction full
aneebkmct
 
Networking
NetworkingNetworking
Networking
Palash Sachan
 
Networking ppt by swapi
Networking ppt by swapi Networking ppt by swapi
Networking ppt by swapi Swapi Pawar
 
Computer: Network and its Topology
Computer: Network and its TopologyComputer: Network and its Topology
Computer: Network and its Topology
Ayushi Gupta
 
NETWORKING PPT
NETWORKING PPTNETWORKING PPT
NETWORKING PPT
VAIBHAV TANWAR
 

Similar to Network (20)

network.pdf
network.pdfnetwork.pdf
network.pdf
 
COMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptxCOMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptx
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
 
Computer Networks .ppt
Computer Networks .pptComputer Networks .ppt
Computer Networks .ppt
 
Computer Networks 1 .ppt
Computer Networks 1 .pptComputer Networks 1 .ppt
Computer Networks 1 .ppt
 
Networks
NetworksNetworks
Networks
 
Computer network
Computer networkComputer network
Computer network
 
Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)
 
Presentation-10.pptx
Presentation-10.pptxPresentation-10.pptx
Presentation-10.pptx
 
Basics of Computer Network
Basics of Computer NetworkBasics of Computer Network
Basics of Computer Network
 
Computer Networking.pptx
Computer Networking.pptxComputer Networking.pptx
Computer Networking.pptx
 
info technology.pptx
info technology.pptxinfo technology.pptx
info technology.pptx
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKING
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
Computer Network Introduction full
Computer Network Introduction fullComputer Network Introduction full
Computer Network Introduction full
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Networking
NetworkingNetworking
Networking
 
Networking ppt by swapi
Networking ppt by swapi Networking ppt by swapi
Networking ppt by swapi
 
Computer: Network and its Topology
Computer: Network and its TopologyComputer: Network and its Topology
Computer: Network and its Topology
 
NETWORKING PPT
NETWORKING PPTNETWORKING PPT
NETWORKING PPT
 

Recently uploaded

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 

Recently uploaded (20)

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 

Network

  • 2. • A computer network is telecommunications network that allows computer to exchange data. • The physical connection between network computing devices is established using either cable media or wireless media. • The best known computer network is the internet.
  • 3. Bases on the size and coverage area, network are characterized in following types • Personal area network (PAN) • Local area network (LAN) • Metropolitan area network (MAN) • Wide area network (WAN)
  • 4. Personal area network, or PAN, is a computer network that enables communication between computer devices near a person. • A personal area network (PAN) is a computer network used for communication among computer and different information technological devices close to one person. • A pan may include wired and wireless devices. • The reach of a pan typically extends to 10 meters.
  • 5. A local area network (LAN) is a collection of devices connected together in one physical location, such as a building, office, or home. A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office building, or closely positioned group of buildings. • Each computer or device on the network is a node. • Wired LANs are most likely based on Ethernet technology.
  • 6. A metropolitan area network (MAN) is a computer network that connects computers within a metropolitan area, which could be a single large city, multiple cities and towns, or any given large area with multiple buildings. • It is relatively larger than LAN and extends across city or a metropolitan. • It is created by connecting two or more LANs located at different locations in a city.
  • 7. A wide-area network is a computer network that connects smaller networks. • A wide area network (WAN) is a computer network that covers a large geographic area such as a city, country, or spans even intercontinental distances. • A WAN uses a communications channel that combines many types of media such as telephone lines, cables, and air waves. • A WAN often makes use of transmission facilities provided by common carriers, such as telephone companies.
  • 8. The arrangement of a network that comprises nodes and connecting lines via sender and receiver is referred to as network topology. A Network Topology is the arrangement with which computer systems or network devices are connected to each other. Topologies may define both physical and logical aspect of the network. Both logical and physical topologies could be same or different in a same network
  • 9. • Bus Topology. • Ring Topology. • Star Topology. • Mesh Topology. • Tree Topology.
  • 10. All devices share single communication line or cable. Bus topology may have problem while multiple hosts sending data at the same time.
  • 11. In ring topology, each host machine connects to exactly two other machines, creating a circular network structure.
  • 12. All hosts in Star topology are connected to a central device, known as hub device, using a point-to-point connection.
  • 13. In this type of topology, a host is connected to one or multiple hosts.This topology has hosts in point-to-point connection with every other host or may also have hosts which are in point-to-point connection to few hosts only.
  • 14. Also known as Hierarchical Topology, this is the most common form of network topology in use presently. This topology imitates as extended Star topology and inherits properties of bus topology.
  • 15. Main benefits of networks include: File sharing - you can easily share data between different users, or access it remotely if you keep it on other connected devices. Resource sharing - using network-connected peripheral devices like printers, scanners and copiers, or sharing software between multiple users, saves money. Sharing a single internet connection - it is cost-efficient and can help protect your systems if you properly secure the network. Increasing storage capacity - you can access files and multimedia, such as images and music, which you store remotely on other machines or network-attached storage devices.