SlideShare a Scribd company logo
Topologies

In communication networks, a topology is usually a schematic
description of the arrangement of a network, including its nodes
and connecting lines. There are two ways of defining network
geometry: the physical topology and the logical (or signal)
topology.
There are six types of physical topologies which are mentioned
below.
Bus Topologies

Every workstation is connected to a main cable named as the
BUS.
Constrains and benefits

Benefits
It is the cheapest type of
topology
Can easily connect to the
computer via a linear bus

Constrains
If one single cable goes down
the whole network goes down
Terminators are required at
both ends of the back bone
cable.
Ring topology
Their workstations are connected in a closed loop configuration.
Adjacent pairs of workstations are directly connected. Other
pairs of workstations are indirectly connected, the data passing
through one or more nodes.
Constrains and benefits

Benefits

Constrains

The data being transmitted
between two nodes passes
through all the intermediate
nodes.
No server is required.

Failure of a network cable can
sometimes make the network
go down.
Star topology

In this topology there is a central server where all
workstations are directly connected.
Constrains and benefits

Benefits
Easy installation and
configuration
No disturbances occurred to
the network when plugging or
unplugging devices
Easy to detect errors
Cost effective

Constrains
Requires more cable length
If the hub is damaged the
whole system will get
damaged.
Mesh topology

It has two schemes called mesh and partial mesh.
In mesh each workstation is connected directly to each other.
In the partial mesh topology, some workstations are connected
to all the others, and some are connected only to those other
nodes with which they exchange the most data.
Constrains and benefits

Benefits
If any of the device is damaged
the system remains safe.
High security and easy to
detect faults

Constrains
Installing and configuring is
difficult
Expensive kind of topology
Tree topology

It simply connects two or more star topologies
together.
The central computers of the star networks are
connected to a main bus.
Token topology

It is used in a star or ring topology where the signal
travels only in one direction.
Logical topologies

It refers to the path that the signal follows from node
to node.

More Related Content

What's hot

Topology
TopologyTopology
Topology
Amar Singh
 
Network And Topology
Network And Topology Network And Topology
Network And Topology
M Sajid R
 
Bus topology ppt
Bus topology pptBus topology ppt
Bus topology ppt
Ananthkumar6965
 
Network topology
Network topologyNetwork topology
Network topology
Jency Pj
 
Best Topology
Best TopologyBest Topology
Best Topology
ami872
 
Network topology And Its Types
Network topology And Its Types Network topology And Its Types
Network topology And Its Types
Jaypee Institute of Information Technology
 
Topology And Mesh Topology Group Presentation
Topology And Mesh Topology Group PresentationTopology And Mesh Topology Group Presentation
Topology And Mesh Topology Group Presentation
Usama Mudassar
 
sp...mads
sp...madssp...mads
sp...mads
pgj17
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
Bharath Thegood
 
Network topology
Network topologyNetwork topology
Network topology
Pavan Kumar B N
 
Computer topology
Computer topologyComputer topology
Computer topology
shreyas dani
 
Network Topology
Network TopologyNetwork Topology
Network Topology
KritiSachita1
 
Network Topology
Network TopologyNetwork Topology
Network Topology
AvikGhara
 
Network topology
Network topologyNetwork topology
Network topology
Network topologyNetwork topology
Network topology
Nafizul Islam
 
What is network topology, Bus, Star, Ring, Tree, Mesh topology
What is network topology, Bus, Star, Ring, Tree, Mesh topologyWhat is network topology, Bus, Star, Ring, Tree, Mesh topology
What is network topology, Bus, Star, Ring, Tree, Mesh topology
A. S. M. Shafi
 
Network Topology
Network TopologyNetwork Topology
Network Topology
AmshalEjaz1
 
Topology
TopologyTopology
TREE TOPOLOGY
TREE TOPOLOGY TREE TOPOLOGY
TREE TOPOLOGY
Nets international LLC
 

What's hot (19)

Topology
TopologyTopology
Topology
 
Network And Topology
Network And Topology Network And Topology
Network And Topology
 
Bus topology ppt
Bus topology pptBus topology ppt
Bus topology ppt
 
Network topology
Network topologyNetwork topology
Network topology
 
Best Topology
Best TopologyBest Topology
Best Topology
 
Network topology And Its Types
Network topology And Its Types Network topology And Its Types
Network topology And Its Types
 
Topology And Mesh Topology Group Presentation
Topology And Mesh Topology Group PresentationTopology And Mesh Topology Group Presentation
Topology And Mesh Topology Group Presentation
 
sp...mads
sp...madssp...mads
sp...mads
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
 
Network topology
Network topologyNetwork topology
Network topology
 
Computer topology
Computer topologyComputer topology
Computer topology
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Network topology
Network topologyNetwork topology
Network topology
 
Network topology
Network topologyNetwork topology
Network topology
 
What is network topology, Bus, Star, Ring, Tree, Mesh topology
What is network topology, Bus, Star, Ring, Tree, Mesh topologyWhat is network topology, Bus, Star, Ring, Tree, Mesh topology
What is network topology, Bus, Star, Ring, Tree, Mesh topology
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Topology
TopologyTopology
Topology
 
TREE TOPOLOGY
TREE TOPOLOGY TREE TOPOLOGY
TREE TOPOLOGY
 

Similar to Network topologies

Types of Network
Types of NetworkTypes of Network
Types of Network
ToufiqueAhmed13
 
Computer network
Computer  networkComputer  network
Computer network
Poorna Chandu Pati
 
network topology
network topologynetwork topology
network topology
harish pillai
 
Network Topologies.pptx
Network Topologies.pptxNetwork Topologies.pptx
Network Topologies.pptx
kulmiye2
 
Network
NetworkNetwork
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
SuratSingh18
 
Network topology
Network topologyNetwork topology
Network topology
ArjonDando1
 
Network Topology's
Network Topology'sNetwork Topology's
Network Topology's
Raja Adapa
 
Determine best fit topology copy
Determine best fit topology   copyDetermine best fit topology   copy
Determine best fit topology copy
Jaleto Sunkemo
 
Network topology
Network topologyNetwork topology
Network topology
yadi1984
 
NETWORK tOPOLOGY.pptx
NETWORK tOPOLOGY.pptxNETWORK tOPOLOGY.pptx
NETWORK tOPOLOGY.pptx
HizbaMemon
 
Network topologies
Network topologiesNetwork topologies
Network topologies
DevoAjit Gupta
 
Topography
TopographyTopography
Topography
rosu555
 
Assignment assignment a 2 Topology.pptx
Assignment  assignment a 2 Topology.pptxAssignment  assignment a 2 Topology.pptx
Assignment assignment a 2 Topology.pptx
MujahidHasan4
 
Class work3
Class work3Class work3
Class work3
RaziaSultanaHimu
 
Anusree Sreedharan PPT 8B.pptx
Anusree Sreedharan PPT 8B.pptxAnusree Sreedharan PPT 8B.pptx
Anusree Sreedharan PPT 8B.pptx
ShaliniSreedharan1
 
Computer Network Topology By Team_Empowerment Ensemble (Dept . of Sociology)
Computer Network Topology By Team_Empowerment Ensemble (Dept . of Sociology)Computer Network Topology By Team_Empowerment Ensemble (Dept . of Sociology)
Computer Network Topology By Team_Empowerment Ensemble (Dept . of Sociology)
Suman Mia
 
Network topology
Network topologyNetwork topology
Network Topologies in computer networking
Network Topologies in computer networkingNetwork Topologies in computer networking
Network Topologies in computer networking
nazmulabdal
 
Topology
TopologyTopology
Topology
MdAnikKhan
 

Similar to Network topologies (20)

Types of Network
Types of NetworkTypes of Network
Types of Network
 
Computer network
Computer  networkComputer  network
Computer network
 
network topology
network topologynetwork topology
network topology
 
Network Topologies.pptx
Network Topologies.pptxNetwork Topologies.pptx
Network Topologies.pptx
 
Network
NetworkNetwork
Network
 
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
 
Network topology
Network topologyNetwork topology
Network topology
 
Network Topology's
Network Topology'sNetwork Topology's
Network Topology's
 
Determine best fit topology copy
Determine best fit topology   copyDetermine best fit topology   copy
Determine best fit topology copy
 
Network topology
Network topologyNetwork topology
Network topology
 
NETWORK tOPOLOGY.pptx
NETWORK tOPOLOGY.pptxNETWORK tOPOLOGY.pptx
NETWORK tOPOLOGY.pptx
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Topography
TopographyTopography
Topography
 
Assignment assignment a 2 Topology.pptx
Assignment  assignment a 2 Topology.pptxAssignment  assignment a 2 Topology.pptx
Assignment assignment a 2 Topology.pptx
 
Class work3
Class work3Class work3
Class work3
 
Anusree Sreedharan PPT 8B.pptx
Anusree Sreedharan PPT 8B.pptxAnusree Sreedharan PPT 8B.pptx
Anusree Sreedharan PPT 8B.pptx
 
Computer Network Topology By Team_Empowerment Ensemble (Dept . of Sociology)
Computer Network Topology By Team_Empowerment Ensemble (Dept . of Sociology)Computer Network Topology By Team_Empowerment Ensemble (Dept . of Sociology)
Computer Network Topology By Team_Empowerment Ensemble (Dept . of Sociology)
 
Network topology
Network topologyNetwork topology
Network topology
 
Network Topologies in computer networking
Network Topologies in computer networkingNetwork Topologies in computer networking
Network Topologies in computer networking
 
Topology
TopologyTopology
Topology
 

Recently uploaded

AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 

Recently uploaded (20)

AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 

Network topologies

  • 1. Topologies In communication networks, a topology is usually a schematic description of the arrangement of a network, including its nodes and connecting lines. There are two ways of defining network geometry: the physical topology and the logical (or signal) topology. There are six types of physical topologies which are mentioned below.
  • 2. Bus Topologies Every workstation is connected to a main cable named as the BUS.
  • 3. Constrains and benefits Benefits It is the cheapest type of topology Can easily connect to the computer via a linear bus Constrains If one single cable goes down the whole network goes down Terminators are required at both ends of the back bone cable.
  • 4. Ring topology Their workstations are connected in a closed loop configuration. Adjacent pairs of workstations are directly connected. Other pairs of workstations are indirectly connected, the data passing through one or more nodes.
  • 5. Constrains and benefits Benefits Constrains The data being transmitted between two nodes passes through all the intermediate nodes. No server is required. Failure of a network cable can sometimes make the network go down.
  • 6. Star topology In this topology there is a central server where all workstations are directly connected.
  • 7. Constrains and benefits Benefits Easy installation and configuration No disturbances occurred to the network when plugging or unplugging devices Easy to detect errors Cost effective Constrains Requires more cable length If the hub is damaged the whole system will get damaged.
  • 8. Mesh topology It has two schemes called mesh and partial mesh. In mesh each workstation is connected directly to each other. In the partial mesh topology, some workstations are connected to all the others, and some are connected only to those other nodes with which they exchange the most data.
  • 9. Constrains and benefits Benefits If any of the device is damaged the system remains safe. High security and easy to detect faults Constrains Installing and configuring is difficult Expensive kind of topology
  • 10. Tree topology It simply connects two or more star topologies together. The central computers of the star networks are connected to a main bus.
  • 11. Token topology It is used in a star or ring topology where the signal travels only in one direction.
  • 12. Logical topologies It refers to the path that the signal follows from node to node.

Editor's Notes

  1. http://whatis.techtarget.com/definition/network-topology
  2. http://whatis.techtarget.com/definition/network-topology