SlideShare a Scribd company logo
Network Topologies
The configuration of a communication network
What are network topologies?
 In communication networks, a topology is a usually schematic description of the
arrangement of a network, including its nodes and connecting lines.
Why we use network topologies?
 Network topology is used initially for planning the best way to design your
network to get maximum performance.
Types of Network Topologies
 Mesh Topology
 Star Topology
 Bus Topology
 Ring Topology
 Tree Topology
Mesh Topology
 Computers in mesh topologies are
connected directly to each other
with cables.
Mesh Topology
Advantages
 Data can be transmitted from
different devices simultaneously.
This topology can withstand high
traffic.
 Even if one of the components fails
there is always an alternative
present. So data transfer doesn’t
get affected.
 Expansion and modification in
topology can be done without
disrupting other nodes.
Disadvantages
 Connections not fully utilized.
 Overall cost of this network is way
too high as compared to other
network topologies.
 Set-up and maintenance of this
topology is very difficult. Even
administration of the network is
tough.
Star Topology
 In a star topology all computers are
connected to a central device
known as hub or switch.
 All the computers share data
through the Hub or Switch
Star Topology
Advantages
 A new node can be easily
connected to the existing network
by connecting it with unused port
of hub.
 If there is fault in cable connected
with computer, only the particular
computer get affected.
 Less cables required than Mesh
Topology. That’s why it is
affordable by small organisations
also.
Disadvantages
 If Hub or switch get faulty, all
computer connected to it will be
get affected.
 Traffic increased when computers
are simultaneously sending data to
each other.
Bus Topology
 In bus topology computers are
connected via a single cable known
as a Trunk or Backbone cable.
 Trunk cable was then connected to
the branch cables which were
further connected to the PCs.
Bus Topology
Advantages
 Uses less cables than star or mesh
topology
 Don’t need any special device like
Hub or Switch.
Disadvantages
 Main disadvantage is the difficulty
of troubleshooting it.
 Bus topology is not scalable. New
node attaching to network is not
easy.
 Backbone cable become faulty all
computer connected to it get
affected.
Ring Topology
 In ring topology all the nodes are
connected to each-other in such a way
that they make a closed loop.
 Data travels around the network, in one
direction. Sending and receiving of data
takes place by the help of TOKEN.
 Token Passing: Token contains a piece of
information which along with data is sent
by the source computer. This token then
passes to next node, which checks if the
signal is intended to it. If yes, it receives
it and passes the empty to into the
network, otherwise passes token along
with the data to next node. This process
continues until the signal reaches its
intended destination.
Ring Topology
Advantages
 Each node gets to send the data when it
receives an empty token. This helps to
reduces chances of collision.
 All the traffics flows in one direction only
at a very high speed.
 No need for network server to control the
connectivity between workstations.
 Each computer has equal access to
resources.
 Receiver and repeater boost the signal
and send it to the next node along with
the token and data.
Disadvantages
 Each packet of data must pass
through all the computers between
source and destination. This makes it
slower.
 If one workstation or port goes down,
the entire network gets affected
 Difficult to add and remove devices
once the network has been set up.
 Data sharing accomplished through
one direction only. It takes more
time to send or receive data.
Tree Topology
 Integrates the characteristics of
star and bus topology.
 In tree topology number of star
network connected using bus. The
backbone cable is called as Bus.
Tree Topology
Advantages
 Expansion of Network is possible and
easy.
 Networks divided into segments, that
can be easily maintained.
 Error detection and correction is
easy.
 Each segment is provided with
dedicated point-to-point wiring to
the central hub.
 If one segment is damaged, other
segments are not affected.
Disadvantages
 Relies heavily on the main bus
cable, if it breaks whole network is
crippled.
 As more and more nodes and
segments are added, the
maintenance becomes difficult.
 Heavy traffic cause the network
and make it slow.

More Related Content

What's hot

Network topology
Network topologyNetwork topology
Network topologyilakkiya
 
Networks topologies Lec#2
Networks topologies Lec#2Networks topologies Lec#2
Networks topologies Lec#2
Punjab and Superior College, Pakpattan
 
Topology presentation
Topology  presentationTopology  presentation
Topology presentationJobaida Nahar
 
Ring topology ppt
Ring topology pptRing topology ppt
Ring topology ppt
Ananthkumar6965
 
Network topologies
Network topologiesNetwork topologies
Network topologies
Online
 
Topology presentation-sachin noire
Topology presentation-sachin noireTopology presentation-sachin noire
Topology presentation-sachin noire
sachin kumar
 
Network Topology
Network TopologyNetwork Topology
Network Topology
Malik Mehrose
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
nnmaurya
 
networking
networkingnetworking
networking
Pooja Dhiman
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
rahul kapoliya
 
Presentation on network topology
Presentation on network topologyPresentation on network topology
Presentation on network topology
Swarnima Tiwari
 
Star topology ppt
Star topology pptStar topology ppt
Star topology ppt
Ananthkumar6965
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Online
 
STAR TOPOLOGY
STAR TOPOLOGY STAR TOPOLOGY
STAR TOPOLOGY
Nets international LLC
 
Wired Transmission Media
Wired Transmission MediaWired Transmission Media
Wired Transmission Media
nimx106
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
ShofiqulIslam38
 
Network topologies
Network topologiesNetwork topologies
Network topologies
Saurabh Puttewar
 

What's hot (20)

Network topology
Network topologyNetwork topology
Network topology
 
Networks topologies Lec#2
Networks topologies Lec#2Networks topologies Lec#2
Networks topologies Lec#2
 
Topology presentation
Topology  presentationTopology  presentation
Topology presentation
 
Computer networks
Computer networksComputer networks
Computer networks
 
Ring topology ppt
Ring topology pptRing topology ppt
Ring topology ppt
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Topology presentation-sachin noire
Topology presentation-sachin noireTopology presentation-sachin noire
Topology presentation-sachin noire
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 
networking
networkingnetworking
networking
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
Presentation on network topology
Presentation on network topologyPresentation on network topology
Presentation on network topology
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Star topology ppt
Star topology pptStar topology ppt
Star topology ppt
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
STAR TOPOLOGY
STAR TOPOLOGY STAR TOPOLOGY
STAR TOPOLOGY
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Wired Transmission Media
Wired Transmission MediaWired Transmission Media
Wired Transmission Media
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 

Similar to Network topologies

network topology
network topologynetwork topology
network topology
harish pillai
 
topology.pptx
topology.pptxtopology.pptx
topology.pptx
YashKoli22
 
Best Topology
Best TopologyBest Topology
Best Topology
ami872
 
Network topology
Network topologyNetwork topology
Network topology
ArjonDando1
 
Network topology
Network topologyNetwork topology
Network topology
Nafizul Islam
 
Network Topologies in computer networking
Network Topologies in computer networkingNetwork Topologies in computer networking
Network Topologies in computer networking
nazmulabdal
 
Types of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterTypes of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouter
AlidHasan4
 
Topology
TopologyTopology
Topology
Burhan Ahmed
 
Determine best fit topology copy
Determine best fit topology   copyDetermine best fit topology   copy
Determine best fit topology copy
Jaleto Sunkemo
 
NETWORK tOPOLOGY.pptx
NETWORK tOPOLOGY.pptxNETWORK tOPOLOGY.pptx
NETWORK tOPOLOGY.pptx
HizbaMemon
 
Topology
TopologyTopology
Topology
MdAnikKhan
 
Network
NetworkNetwork
Computer Networks
Computer NetworksComputer Networks
Computer Networks
Raj vardhan
 
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
SuratSingh18
 
Network topology
Network topologyNetwork topology
Network topology
maandomingo8
 
Networktopology xii
Networktopology xiiNetworktopology xii
Networktopology xii
saltyp
 
Network Topologies.pptx
Network Topologies.pptxNetwork Topologies.pptx
Network Topologies.pptx
kulmiye2
 
Unit 1_ Network Topologies session 2.pptx
Unit 1_ Network Topologies session 2.pptxUnit 1_ Network Topologies session 2.pptx
Unit 1_ Network Topologies session 2.pptx
Asst.prof M.Gokilavani
 
Lesson 8
Lesson 8Lesson 8
Lesson 8
Gicheru Onesmus
 

Similar to Network topologies (20)

network topology
network topologynetwork topology
network topology
 
topology.pptx
topology.pptxtopology.pptx
topology.pptx
 
Best Topology
Best TopologyBest Topology
Best Topology
 
Network topology
Network topologyNetwork topology
Network topology
 
Network topology
Network topologyNetwork topology
Network topology
 
Network Topologies in computer networking
Network Topologies in computer networkingNetwork Topologies in computer networking
Network Topologies in computer networking
 
Types of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterTypes of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouter
 
Topology
TopologyTopology
Topology
 
Determine best fit topology copy
Determine best fit topology   copyDetermine best fit topology   copy
Determine best fit topology copy
 
NETWORK tOPOLOGY.pptx
NETWORK tOPOLOGY.pptxNETWORK tOPOLOGY.pptx
NETWORK tOPOLOGY.pptx
 
report.pptx
report.pptxreport.pptx
report.pptx
 
Topology
TopologyTopology
Topology
 
Network
NetworkNetwork
Network
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
 
Network topology
Network topologyNetwork topology
Network topology
 
Networktopology xii
Networktopology xiiNetworktopology xii
Networktopology xii
 
Network Topologies.pptx
Network Topologies.pptxNetwork Topologies.pptx
Network Topologies.pptx
 
Unit 1_ Network Topologies session 2.pptx
Unit 1_ Network Topologies session 2.pptxUnit 1_ Network Topologies session 2.pptx
Unit 1_ Network Topologies session 2.pptx
 
Lesson 8
Lesson 8Lesson 8
Lesson 8
 

Recently uploaded

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

Network topologies

  • 1. Network Topologies The configuration of a communication network
  • 2. What are network topologies?  In communication networks, a topology is a usually schematic description of the arrangement of a network, including its nodes and connecting lines.
  • 3. Why we use network topologies?  Network topology is used initially for planning the best way to design your network to get maximum performance.
  • 4. Types of Network Topologies  Mesh Topology  Star Topology  Bus Topology  Ring Topology  Tree Topology
  • 5. Mesh Topology  Computers in mesh topologies are connected directly to each other with cables.
  • 6. Mesh Topology Advantages  Data can be transmitted from different devices simultaneously. This topology can withstand high traffic.  Even if one of the components fails there is always an alternative present. So data transfer doesn’t get affected.  Expansion and modification in topology can be done without disrupting other nodes. Disadvantages  Connections not fully utilized.  Overall cost of this network is way too high as compared to other network topologies.  Set-up and maintenance of this topology is very difficult. Even administration of the network is tough.
  • 7. Star Topology  In a star topology all computers are connected to a central device known as hub or switch.  All the computers share data through the Hub or Switch
  • 8. Star Topology Advantages  A new node can be easily connected to the existing network by connecting it with unused port of hub.  If there is fault in cable connected with computer, only the particular computer get affected.  Less cables required than Mesh Topology. That’s why it is affordable by small organisations also. Disadvantages  If Hub or switch get faulty, all computer connected to it will be get affected.  Traffic increased when computers are simultaneously sending data to each other.
  • 9. Bus Topology  In bus topology computers are connected via a single cable known as a Trunk or Backbone cable.  Trunk cable was then connected to the branch cables which were further connected to the PCs.
  • 10. Bus Topology Advantages  Uses less cables than star or mesh topology  Don’t need any special device like Hub or Switch. Disadvantages  Main disadvantage is the difficulty of troubleshooting it.  Bus topology is not scalable. New node attaching to network is not easy.  Backbone cable become faulty all computer connected to it get affected.
  • 11. Ring Topology  In ring topology all the nodes are connected to each-other in such a way that they make a closed loop.  Data travels around the network, in one direction. Sending and receiving of data takes place by the help of TOKEN.  Token Passing: Token contains a piece of information which along with data is sent by the source computer. This token then passes to next node, which checks if the signal is intended to it. If yes, it receives it and passes the empty to into the network, otherwise passes token along with the data to next node. This process continues until the signal reaches its intended destination.
  • 12. Ring Topology Advantages  Each node gets to send the data when it receives an empty token. This helps to reduces chances of collision.  All the traffics flows in one direction only at a very high speed.  No need for network server to control the connectivity between workstations.  Each computer has equal access to resources.  Receiver and repeater boost the signal and send it to the next node along with the token and data. Disadvantages  Each packet of data must pass through all the computers between source and destination. This makes it slower.  If one workstation or port goes down, the entire network gets affected  Difficult to add and remove devices once the network has been set up.  Data sharing accomplished through one direction only. It takes more time to send or receive data.
  • 13. Tree Topology  Integrates the characteristics of star and bus topology.  In tree topology number of star network connected using bus. The backbone cable is called as Bus.
  • 14. Tree Topology Advantages  Expansion of Network is possible and easy.  Networks divided into segments, that can be easily maintained.  Error detection and correction is easy.  Each segment is provided with dedicated point-to-point wiring to the central hub.  If one segment is damaged, other segments are not affected. Disadvantages  Relies heavily on the main bus cable, if it breaks whole network is crippled.  As more and more nodes and segments are added, the maintenance becomes difficult.  Heavy traffic cause the network and make it slow.

Editor's Notes

  1. If we have a organisation and we have 8-10 computers to work on. We need to share the data etc. etc.