SlideShare a Scribd company logo
1 of 10
Download to read offline
1
1
Network Topologies
• LANs and WANs - Geographical coverage
• LANs
– A single geographical location, such as office building,
school, etc
– Typically High speed and cheaper.
• WANs
– Spans more than one geographical location often
connecting separated LANs
– Slower
– Costly hardware, routers, dedicated leased lines and
complicated implementation procedures.
2
Network Topologies
• Topology - Physical and logical network
layout
– Physical – actual layout of the computer cables
and other network devices
– Logical – the way in which the network appears
to the devices that use it.
• Common topologies:
– Bus, ring, star, mesh and wireless
2
3
Bus topology
• Uses a trunk or backbone to which all of the computers on
the network connect.
• Systems connect to this backbone using T connectors or
taps.
• Coaxial cablings ( 10Base-2, 10Base5) were popular
options years ago.
4
Bus Topology
Difficult to troubleshoot.Does not use any specialized network
equipment.
A break in the cable will prevent all
systems from accessing the network.
Require less cable
Network disruption when computers are
added or removed
Cheap and easy to implement
DisadvantagesAdvantages
3
5
Ring Topology
• Logical ring
– Meaning that data travels in circular fashion
from one computer to another on the network.
– Typically FDDI, SONET or Token Ring
technology are used to implement a ring
network
– Ring networks are most commonly wired in a
star configuration
• Token Ring has multi-station access unit
(MSAU),equivalent to hub or switch. MSAU
performs the token circulation internally.
6
Ring Topology
A single break in the cable can disrupt the
entire network.
Ring networks are moderately easy to
install
Expansion to the network can cause
network disruption
Cable faults are easily located, making
troubleshooting easier
DisadvantagesAdvantages
4
7
Star Topology
• All computers/devices connect to a central
device called hub or switch.
• Each device requires a single cable
• point-to-point connection between the
device and hub.
• Most widely implemented
• Hub is the single point of failure
8
Star Topology
More difficult to implementEasy to troubleshoot and isolate
problems
A central connecting device allows
for a single point of failure
Cable failure affects only a single
user
Requires more cableEasily expanded without disruption
to the network
DisadvantagesAdvantages
5
9
Mesh Topology
• Each computer connects to every other.
• High level of redundancy.
• Rarely used.
– Wiring is very complicated
– Cabling cost is high
– Troubleshooting a failed cable is tricky
– A variation hybrid mesh – create point to point
connection between specific network devices, often
seen in WAN implementation.
10
Mesh Topology
Complicated implementationThe network can be expanded
without disruption to current uses
Requires more cable than the other
LAN topologies
Provides redundant paths between
devices
DisadvantagesAdvantages
6
11
Wireless networking
• Do not require physical cabling
• Particularly useful for remote access for
laptop users
• Eliminate cable faults and cable breaks.
• Signal interference and security issue.
12
Wireless networking
Limited speed in comparison to other
network topologies
Network can be expanded without
disruption to current users
Potential security issues associated with
wireless transmissions
Allows for wireless remote access
DisadvantagesAdvantages
7
13
IEEE and Networking standards
• Institute of Electrical and Electronic
Engineers (IEEE) developed a series of
networking standards
– Networking technologies developed by
manufacturers are Compatible
– Cabling, networking devices and protocols are
all interchangeable under the banner of a
specific IEEE
14
100Mbps technologies, including 100BASEVG-AnyLAN802.12
Wireless networks802.11
Standards for Interoperable LAN/MAN Security (SILS) (Network
Security)
802.10
Integrated Voice and Data Networks802.9
Fiber-Optic Technical Advisory Group802.8
Broadband Technical Advisory Group802.7
Metropolitan Area Network (MAN)802.6
Token Ring networks802.5
A token passing bus802.4
CSMA/CD ( Carrier Sense Multiple Access with Collision
Detection) for Ethernet networks
802.3
The LLC(Logincal Link Control) sublayer802.2
Internetworking802.1
NameSpecification
8
15
802.3 IEEE standard
• Defines characteristics for Ethernet networks.
• New additions,
– 802.3u for Fast Ethernet
– 802.3z for Gigabit Ethernet, referred to as 802.3x.
– … …
– 802.3ac 10gbits/s, expe. 2009
– … …
• Speed: Original 10Mbps, Fast Ethernet 100Mbps, Gigabit Ethernet
1000Mbps
• Topology: bus or star.
• Media: Coaxial and twisted pair cabling, also fiber optic cable.
• Access method: CSMA/CD
16
802.5 IEEE standard
• Specifies the characteristics for Token Ring
Networks.
• Introduced by IBM in the mid 80s, network
topology of choice until the rise of the popularity
of Ethernet.
• Speed: 4 to 16Mbps
• Topology: logical ring and most often a physical
star. Logical ring is often created in the
Multistation Access Unit (MSAU)
• Media: twisted pair cabling.
• Access method: token passing.
9
17
802.11b IEEE Standard - Wireless
• Specifies the characteristics of wireless LAN Ethernet networks.
– Special devices called wireless access points to allow communicate.
– Also connect to wired networks to create wireless portions of entire
networks.
– Access method: Carrier Sense Multiple Access/Collision Avoidance
(CSMA/CA ), a variation of CSMA/CD.
– Topology: physical wireless, logical bus
• Protocol
– 802.11b 1999 2.4GHz, 11Mbits/s
– 802.11g 2003 2.4GHz, 54 Mbits/s
– 802.11n 2008 2.4G,5GHz, 248Mbits/s
– ... …
18
FDDI
• Fiber Distributed Data Interface (FDDI) standard
was developed by American National Standards
Institute (ANSI)
• Dual ring technology for fault tolerance
• Speed: 100Mbps or higher
• Topology: dual ring topology
• Media: fiber optic cable, > 2 kilometers. Also
possible use copper wire as Copper Distributed
Data Interface (CDDI).
• Access method: token-passing access method
10
19
Token
passing
Fiber-optic
Twisted
pair/CDDI
RingDual Ring100MbpsFDDI
CSMA/CARadio wavesBusWireless11Mbps802.11b
Token
passing
Twisted pairRingStar4Mbps and
16Mbps
802.5
CSMA/CDTwisted pairBusStar1000Mbps(802.3z)
CSMA/CDTwisted pairBusStar100Mbps( Fast
Ethernet)
(802.3u)
CSMA/CDCoaxial and
Twisted pair
Bus and Star10Mbps802.3
Access
Method
MediaLogical
Topology
Physical
Topology
SpeedStandard

More Related Content

What's hot

Network topology....sajal
Network topology....sajalNetwork topology....sajal
Network topology....sajalSajal Das
 
Accessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAccessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAbdelkhalik Mosa
 
Network topologies
Network topologiesNetwork topologies
Network topologiesniraj singh
 
Topology presentation
Topology  presentationTopology  presentation
Topology presentationJobaida Nahar
 
topology Final Presentation Fardeen N Qasim
topology Final  Presentation  Fardeen N  Qasimtopology Final  Presentation  Fardeen N  Qasim
topology Final Presentation Fardeen N Qasimguest4bcae0
 
BASIC NETWORKING TOPOLOGIES
BASIC NETWORKING TOPOLOGIESBASIC NETWORKING TOPOLOGIES
BASIC NETWORKING TOPOLOGIESKirti Garg
 
Network topology
Network topologyNetwork topology
Network topologyVpmv
 
Topology Document
Topology DocumentTopology Document
Topology DocumentPratik Vyas
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts reviewPalanivel Kuppusamy
 
Top schools in faridabad
Top schools in faridabadTop schools in faridabad
Top schools in faridabadEdhole.com
 
Networking Chapter 16
Networking Chapter 16Networking Chapter 16
Networking Chapter 16mlrbrown
 

What's hot (17)

Network topology....sajal
Network topology....sajalNetwork topology....sajal
Network topology....sajal
 
Accessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAccessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network Security
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network topology
Network topologyNetwork topology
Network topology
 
Topology presentation
Topology  presentationTopology  presentation
Topology presentation
 
topology Final Presentation Fardeen N Qasim
topology Final  Presentation  Fardeen N  Qasimtopology Final  Presentation  Fardeen N  Qasim
topology Final Presentation Fardeen N Qasim
 
BASIC NETWORKING TOPOLOGIES
BASIC NETWORKING TOPOLOGIESBASIC NETWORKING TOPOLOGIES
BASIC NETWORKING TOPOLOGIES
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Network topology
Network topologyNetwork topology
Network topology
 
Topology Presentation
Topology PresentationTopology Presentation
Topology Presentation
 
Topology Document
Topology DocumentTopology Document
Topology Document
 
Network topology
Network topology Network topology
Network topology
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
 
Hardware3
Hardware3Hardware3
Hardware3
 
Top schools in faridabad
Top schools in faridabadTop schools in faridabad
Top schools in faridabad
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Networking Chapter 16
Networking Chapter 16Networking Chapter 16
Networking Chapter 16
 

Viewers also liked

Sharded Joins for Scalable Incremental Graph Queries
Sharded Joins for Scalable Incremental Graph QueriesSharded Joins for Scalable Incremental Graph Queries
Sharded Joins for Scalable Incremental Graph QueriesGábor Szárnyas
 
Towards a Macrobenchmark Framework for Performance Analysis of Java Applications
Towards a Macrobenchmark Framework for Performance Analysis of Java ApplicationsTowards a Macrobenchmark Framework for Performance Analysis of Java Applications
Towards a Macrobenchmark Framework for Performance Analysis of Java ApplicationsGábor Szárnyas
 
Towards the Characterization of Realistic Models: Evaluation of Multidiscipli...
Towards the Characterization of Realistic Models: Evaluation of Multidiscipli...Towards the Characterization of Realistic Models: Evaluation of Multidiscipli...
Towards the Characterization of Realistic Models: Evaluation of Multidiscipli...Gábor Szárnyas
 
Top 5 seo tools – top 5 seo softwares
Top 5 seo tools – top 5 seo softwaresTop 5 seo tools – top 5 seo softwares
Top 5 seo tools – top 5 seo softwaresief-ajal
 
A process control primer
A process control primerA process control primer
A process control primerPhilani Ngema
 

Viewers also liked (7)

LA
LALA
LA
 
Sharded Joins for Scalable Incremental Graph Queries
Sharded Joins for Scalable Incremental Graph QueriesSharded Joins for Scalable Incremental Graph Queries
Sharded Joins for Scalable Incremental Graph Queries
 
Môn ngữ văn
Môn ngữ vănMôn ngữ văn
Môn ngữ văn
 
Towards a Macrobenchmark Framework for Performance Analysis of Java Applications
Towards a Macrobenchmark Framework for Performance Analysis of Java ApplicationsTowards a Macrobenchmark Framework for Performance Analysis of Java Applications
Towards a Macrobenchmark Framework for Performance Analysis of Java Applications
 
Towards the Characterization of Realistic Models: Evaluation of Multidiscipli...
Towards the Characterization of Realistic Models: Evaluation of Multidiscipli...Towards the Characterization of Realistic Models: Evaluation of Multidiscipli...
Towards the Characterization of Realistic Models: Evaluation of Multidiscipli...
 
Top 5 seo tools – top 5 seo softwares
Top 5 seo tools – top 5 seo softwaresTop 5 seo tools – top 5 seo softwares
Top 5 seo tools – top 5 seo softwares
 
A process control primer
A process control primerA process control primer
A process control primer
 

Similar to Network topologies

NFPhysical Layer.pptx
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptxmmmm11111
 
DITEC - Fundamentals in Networking
DITEC - Fundamentals in NetworkingDITEC - Fundamentals in Networking
DITEC - Fundamentals in NetworkingRasan Samarasinghe
 
DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)Rasan Samarasinghe
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxAASTHAJAJOO
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005SOLOMONCHINAEMEUCHEA
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Aneesh Nelavelly
 
Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to NetworkingMohammed Adam
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkAtika Zaimi
 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18Sagar Walvekar
 
Networking Hardware Concepts
Networking Hardware ConceptsNetworking Hardware Concepts
Networking Hardware ConceptsAmir Villas
 

Similar to Network topologies (20)

Network topologies
Network topologiesNetwork topologies
Network topologies
 
Unit2
Unit2Unit2
Unit2
 
NFPhysical Layer.pptx
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptx
 
RAKESH.pptx
RAKESH.pptxRAKESH.pptx
RAKESH.pptx
 
DITEC - Fundamentals in Networking
DITEC - Fundamentals in NetworkingDITEC - Fundamentals in Networking
DITEC - Fundamentals in Networking
 
DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)
 
Basic networking
Basic networkingBasic networking
Basic networking
 
presentation on type of toplogy and network
presentation on type of toplogy and networkpresentation on type of toplogy and network
presentation on type of toplogy and network
 
Chapter10
Chapter10Chapter10
Chapter10
 
Network design - Topology
Network design  - TopologyNetwork design  - Topology
Network design - Topology
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptx
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1
 
Cct203 lesson 10
Cct203 lesson 10Cct203 lesson 10
Cct203 lesson 10
 
Networks PPT
Networks PPTNetworks PPT
Networks PPT
 
Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to Networking
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18
 
Networking Hardware Concepts
Networking Hardware ConceptsNetworking Hardware Concepts
Networking Hardware Concepts
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Network topologies

  • 1. 1 1 Network Topologies • LANs and WANs - Geographical coverage • LANs – A single geographical location, such as office building, school, etc – Typically High speed and cheaper. • WANs – Spans more than one geographical location often connecting separated LANs – Slower – Costly hardware, routers, dedicated leased lines and complicated implementation procedures. 2 Network Topologies • Topology - Physical and logical network layout – Physical – actual layout of the computer cables and other network devices – Logical – the way in which the network appears to the devices that use it. • Common topologies: – Bus, ring, star, mesh and wireless
  • 2. 2 3 Bus topology • Uses a trunk or backbone to which all of the computers on the network connect. • Systems connect to this backbone using T connectors or taps. • Coaxial cablings ( 10Base-2, 10Base5) were popular options years ago. 4 Bus Topology Difficult to troubleshoot.Does not use any specialized network equipment. A break in the cable will prevent all systems from accessing the network. Require less cable Network disruption when computers are added or removed Cheap and easy to implement DisadvantagesAdvantages
  • 3. 3 5 Ring Topology • Logical ring – Meaning that data travels in circular fashion from one computer to another on the network. – Typically FDDI, SONET or Token Ring technology are used to implement a ring network – Ring networks are most commonly wired in a star configuration • Token Ring has multi-station access unit (MSAU),equivalent to hub or switch. MSAU performs the token circulation internally. 6 Ring Topology A single break in the cable can disrupt the entire network. Ring networks are moderately easy to install Expansion to the network can cause network disruption Cable faults are easily located, making troubleshooting easier DisadvantagesAdvantages
  • 4. 4 7 Star Topology • All computers/devices connect to a central device called hub or switch. • Each device requires a single cable • point-to-point connection between the device and hub. • Most widely implemented • Hub is the single point of failure 8 Star Topology More difficult to implementEasy to troubleshoot and isolate problems A central connecting device allows for a single point of failure Cable failure affects only a single user Requires more cableEasily expanded without disruption to the network DisadvantagesAdvantages
  • 5. 5 9 Mesh Topology • Each computer connects to every other. • High level of redundancy. • Rarely used. – Wiring is very complicated – Cabling cost is high – Troubleshooting a failed cable is tricky – A variation hybrid mesh – create point to point connection between specific network devices, often seen in WAN implementation. 10 Mesh Topology Complicated implementationThe network can be expanded without disruption to current uses Requires more cable than the other LAN topologies Provides redundant paths between devices DisadvantagesAdvantages
  • 6. 6 11 Wireless networking • Do not require physical cabling • Particularly useful for remote access for laptop users • Eliminate cable faults and cable breaks. • Signal interference and security issue. 12 Wireless networking Limited speed in comparison to other network topologies Network can be expanded without disruption to current users Potential security issues associated with wireless transmissions Allows for wireless remote access DisadvantagesAdvantages
  • 7. 7 13 IEEE and Networking standards • Institute of Electrical and Electronic Engineers (IEEE) developed a series of networking standards – Networking technologies developed by manufacturers are Compatible – Cabling, networking devices and protocols are all interchangeable under the banner of a specific IEEE 14 100Mbps technologies, including 100BASEVG-AnyLAN802.12 Wireless networks802.11 Standards for Interoperable LAN/MAN Security (SILS) (Network Security) 802.10 Integrated Voice and Data Networks802.9 Fiber-Optic Technical Advisory Group802.8 Broadband Technical Advisory Group802.7 Metropolitan Area Network (MAN)802.6 Token Ring networks802.5 A token passing bus802.4 CSMA/CD ( Carrier Sense Multiple Access with Collision Detection) for Ethernet networks 802.3 The LLC(Logincal Link Control) sublayer802.2 Internetworking802.1 NameSpecification
  • 8. 8 15 802.3 IEEE standard • Defines characteristics for Ethernet networks. • New additions, – 802.3u for Fast Ethernet – 802.3z for Gigabit Ethernet, referred to as 802.3x. – … … – 802.3ac 10gbits/s, expe. 2009 – … … • Speed: Original 10Mbps, Fast Ethernet 100Mbps, Gigabit Ethernet 1000Mbps • Topology: bus or star. • Media: Coaxial and twisted pair cabling, also fiber optic cable. • Access method: CSMA/CD 16 802.5 IEEE standard • Specifies the characteristics for Token Ring Networks. • Introduced by IBM in the mid 80s, network topology of choice until the rise of the popularity of Ethernet. • Speed: 4 to 16Mbps • Topology: logical ring and most often a physical star. Logical ring is often created in the Multistation Access Unit (MSAU) • Media: twisted pair cabling. • Access method: token passing.
  • 9. 9 17 802.11b IEEE Standard - Wireless • Specifies the characteristics of wireless LAN Ethernet networks. – Special devices called wireless access points to allow communicate. – Also connect to wired networks to create wireless portions of entire networks. – Access method: Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA ), a variation of CSMA/CD. – Topology: physical wireless, logical bus • Protocol – 802.11b 1999 2.4GHz, 11Mbits/s – 802.11g 2003 2.4GHz, 54 Mbits/s – 802.11n 2008 2.4G,5GHz, 248Mbits/s – ... … 18 FDDI • Fiber Distributed Data Interface (FDDI) standard was developed by American National Standards Institute (ANSI) • Dual ring technology for fault tolerance • Speed: 100Mbps or higher • Topology: dual ring topology • Media: fiber optic cable, > 2 kilometers. Also possible use copper wire as Copper Distributed Data Interface (CDDI). • Access method: token-passing access method
  • 10. 10 19 Token passing Fiber-optic Twisted pair/CDDI RingDual Ring100MbpsFDDI CSMA/CARadio wavesBusWireless11Mbps802.11b Token passing Twisted pairRingStar4Mbps and 16Mbps 802.5 CSMA/CDTwisted pairBusStar1000Mbps(802.3z) CSMA/CDTwisted pairBusStar100Mbps( Fast Ethernet) (802.3u) CSMA/CDCoaxial and Twisted pair Bus and Star10Mbps802.3 Access Method MediaLogical Topology Physical Topology SpeedStandard