SlideShare a Scribd company logo
Physical And
Logical
Topologies
Physical
Topology
Bus
Star
Ring
Mesh
Hybrid
Physical Topology
 The physical layout of devices on a network.
 Physical topology refers to the interconnected
structure of a local area network (LAN).
 Physical topology is the way that the devices on a
network are arranged and how they communicate
with each other.
 The method employed to connect the physical
devices on the network with the cables, and the
type of cabling used, all constitute the physical
topology.
Bus Topology
 The bus topology is often referred to as a "linear bus" because
the computers are connected in a straight line.
 It consists of a single cable that connects all of the computers
in the network in a single line.
 Computers on a bus topology network communicate by
addressing data to a particular computer and sending out
that data on the cable as electronic signals.
Communication on Bus
 Sending the signal
 Signal bounce
 Terminator
1.Sending the signal
 Network data in the form of electronic signals is sent to all the
computers on the network.
 Only the computer whose address matches the address encoded
in the original signal accepts the information. All other
computers reject the data.
 Because only one computer at a time can send data on a bus
network, the number of computers attached to the bus will affect
network performance.
 The more computers there are on a bus, the more computers will
be waiting to put data on the bus and, consequently, the slower
the network will be.
2.Signal Bounce
 Because the data, or electronic signal, is sent to
the entire network, it travels from one end of the
cable to the other.
 If the signal is allowed to continue uninterrupted,
it will keep bouncing back and forth along the
cable and prevent other computers from sending
signals.
 Therefore, the signal must be stopped after it has
had a chance to reach the proper destination
address.
3. Terminator
 Terminator is used to stop the signal from
bouncing, a component called a terminator is
placed at each end of the cable to absorb free
signals.
 Absorbing the signal clears the cable so that other
computers can send data.
Star Topology
 In the star topology, cable segments from each
computer are connected to a centralized
component called a hub.
 Signals are transmitted from the sending computer
through the hub to all computers on the network.
 The star network offers the advantage of
centralized resources and management. However,
because each computer is connected to a central
point, it requires a great deal of cable in a large
network installation.
 If the central point fails, the entire network goes
down.
 If one computer—or the cable that connects it to
the hub—fails on a star network, only the failed
computer will not be able to send or receive
network data. The rest of the network continues to
function normally.
Ring Topology
 The ring topology connects computers on a single circle of
cable.
 Unlike the bus topology, there are no terminated ends.
 The signals travel around the loop in one direction and pass
through each computer, which can act as a repeater to boost
the signal and send it on to the next computer
 The failure of one computer can have an impact on the entire
network.
 One method of transmitting data around a ring is
called token passing.
Mesh Topology A mesh topology network offers superior redundancy
and reliability.
 In a mesh topology, each computer is connected to
every other computer by separate cabling.
 This configuration provides redundant paths
throughout the network so that if one cable fails,
another will take over the traffic.
 these networks are expensive to install because they
use a lot of cabling.
 Often, a mesh topology will be used in conjunction with
other topologies to form a hybrid topology.
Fig: Mesh Topology
Hybrid Topology
 Hybrid networks use a combination of any two or
more topologies, in such a way that the resulting
network does not exhibit one of the standard
topologies (e.g., bus, star, ring, etc.).
 For example a tree network connected to a tree
network is still a tree network topology.
 A hybrid topology is always produced when two
different basic network topologies are connected.
 Two common examples for Hybrid network
are: star ring network and star bus network
Logical topology
• IT IS THE ARRANGEMENT OF DEVICES ON A COMPUTER NETWORK AND
HOW THEY COMMUNICATE WITH ONE ANOTHER. HOW DEVICES ARE
CONNECTED TO THE NETWORK THROUGH THE ACTUAL CABLES THAT
TRANSMIT DATA, OR THE PHYSICAL STRUCTURE OF THE NETWORK, IS
CALLED THE PHYSICAL TOPOLOGY. PHYSICAL TOPOLOGY DEFINES HOW
THE SYSTEMS ARE PHYSICALLY CONNECTED. IT REPRESENTS THE
PHYSICAL LAYOUT OF THE DEVICES ON THE NETWORK. THE LOGICAL
TOPOLOGY DEFINES HOW THE SYSTEMS COMMUNICATE ACROSS THE
PHYSICAL TOPOLOGIES.
• LOGICAL TOPOLOGIES ARE BOUND TO NETWORK PROTOCOLS AND
DESCRIBE HOW DATA IS MOVED ACROSS THE NETWORK.
• TWO OF THE MOST COMMON LOGICAL TOPOLOGIES ARE:
BUS TOPOLOGY: ETHERNET USES THE LOGICAL BUS TOPOLOGY TO
TRANSFER DATA. UNDER A BUS TOPOLOGY A NODE BROADCASTS THE
DATA TO THE ENTIRE NETWORK. ALL OTHER NODES ON THE NETWORK
HEAR THE DATA AND CHECK IF THE DATA IS INTENDED FOR THEM.
RING TOPOLOGY: IN THIS TOPOLOGY, ONLY ONE NODE CAN BE ALLOWED

More Related Content

What's hot

Multiplexing
MultiplexingMultiplexing
Multiplexing
Aman Jaiswal
 
Presentation on topology
Presentation on topologyPresentation on topology
Presentation on topology
kalyan kumar
 
Session Layer
Session LayerSession Layer
Session Layer
sarangaprabod
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
kirbadh
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
Mukesh Tekwani
 
Popular network devices
Popular network devicesPopular network devices
Popular network devices
Mahesh_Naidu
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IPMannu Khani
 
Data link layer
Data link layer Data link layer
Data link layer
Mukesh Chinta
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data Communication
Kamal Acharya
 
Packet switching
Packet switchingPacket switching
Packet switchingasimnawaz54
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
shashi712
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
Sangeetha Rangarajan
 
LAN (Local Area Network)
LAN (Local Area Network)LAN (Local Area Network)
LAN (Local Area Network)
Ridwanul Hoque
 
Lec1 :- Data communication and network
Lec1 :- Data communication and networkLec1 :- Data communication and network
Lec1 :- Data communication and network
Dhrumil Shah
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
Networking
NetworkingNetworking
Networking
Palash Sachan
 
Networking devices
Networking devicesNetworking devices
Networking devices
NetProtocol Xpert
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5
Pnkj_Sharma
 
Application Layer
Application Layer Application Layer
Application Layer
Dr Shashikant Athawale
 

What's hot (20)

Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Presentation on topology
Presentation on topologyPresentation on topology
Presentation on topology
 
Session Layer
Session LayerSession Layer
Session Layer
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
Popular network devices
Popular network devicesPopular network devices
Popular network devices
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
Data link layer
Data link layer Data link layer
Data link layer
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data Communication
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
Networking (2)
Networking (2)Networking (2)
Networking (2)
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
LAN (Local Area Network)
LAN (Local Area Network)LAN (Local Area Network)
LAN (Local Area Network)
 
Lec1 :- Data communication and network
Lec1 :- Data communication and networkLec1 :- Data communication and network
Lec1 :- Data communication and network
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Networking
NetworkingNetworking
Networking
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5
 
Application Layer
Application Layer Application Layer
Application Layer
 

Viewers also liked

Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
Siddique Ibrahim
 
NETWORK TOPOLOGIES (NETWORK TOPOLOGY)
NETWORK TOPOLOGIES (NETWORK TOPOLOGY)NETWORK TOPOLOGIES (NETWORK TOPOLOGY)
NETWORK TOPOLOGIES (NETWORK TOPOLOGY)
𝖆𝖑𝖕𝖍𝖆 𝖆𝖑𝖕𝖍𝖆
 
Network topologies
Network topologiesNetwork topologies
Network topologies
Norah Saad
 
Network Topology
Network TopologyNetwork Topology
Network Topology
Norhisham Mohamad Nordin
 
Network topology
Network topologyNetwork topology
Network topology
lekshmik
 
Network topologies
Network topologiesNetwork topologies
Network topologies
Shripal Oswal
 
Topology presentation
Topology  presentationTopology  presentation
Topology presentationJobaida Nahar
 
Network Topologies
Network TopologiesNetwork Topologies
Network TopologiesJason Hando
 
Alternative communication networks, framing and the construction of political...
Alternative communication networks, framing and the construction of political...Alternative communication networks, framing and the construction of political...
Alternative communication networks, framing and the construction of political...mmavidad
 
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...
Spiceworks
 
Network topologies
Network topologiesNetwork topologies
Network topologies
Chirag Rajput
 
How do you_honeycomb_android_for_tablets
How do you_honeycomb_android_for_tabletsHow do you_honeycomb_android_for_tablets
How do you_honeycomb_android_for_tablets
Sparky Rhode
 
Introducing Honeycomb
Introducing HoneycombIntroducing Honeycomb
Introducing Honeycomb
CommonsWare
 
Honeycomb User Interface Design @iRajLal
Honeycomb User Interface Design @iRajLalHoneycomb User Interface Design @iRajLal
Honeycomb User Interface Design @iRajLal
Raj Lal
 
Network topology....sajal
Network topology....sajalNetwork topology....sajal
Network topology....sajalSajal Das
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
3rdyeara
 
GE Smallworld Network Inventory Overview
GE Smallworld Network Inventory OverviewGE Smallworld Network Inventory Overview
GE Smallworld Network Inventory Overviewcwilson5496
 
Spiceworks Intro
Spiceworks IntroSpiceworks Intro
Spiceworks Intro
ground047
 
FTTx Network Rollout - Realising Business Benefits with Smallworld
FTTx Network Rollout - Realising Business Benefits with SmallworldFTTx Network Rollout - Realising Business Benefits with Smallworld
FTTx Network Rollout - Realising Business Benefits with Smallworld
Kiran Solipuram. DEP, CFHP
 

Viewers also liked (20)

Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 
NETWORK TOPOLOGIES (NETWORK TOPOLOGY)
NETWORK TOPOLOGIES (NETWORK TOPOLOGY)NETWORK TOPOLOGIES (NETWORK TOPOLOGY)
NETWORK TOPOLOGIES (NETWORK TOPOLOGY)
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Network topology
Network topologyNetwork topology
Network topology
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Topology presentation
Topology  presentationTopology  presentation
Topology presentation
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
1.network topology
1.network topology1.network topology
1.network topology
 
Alternative communication networks, framing and the construction of political...
Alternative communication networks, framing and the construction of political...Alternative communication networks, framing and the construction of political...
Alternative communication networks, framing and the construction of political...
 
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
How do you_honeycomb_android_for_tablets
How do you_honeycomb_android_for_tabletsHow do you_honeycomb_android_for_tablets
How do you_honeycomb_android_for_tablets
 
Introducing Honeycomb
Introducing HoneycombIntroducing Honeycomb
Introducing Honeycomb
 
Honeycomb User Interface Design @iRajLal
Honeycomb User Interface Design @iRajLalHoneycomb User Interface Design @iRajLal
Honeycomb User Interface Design @iRajLal
 
Network topology....sajal
Network topology....sajalNetwork topology....sajal
Network topology....sajal
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
GE Smallworld Network Inventory Overview
GE Smallworld Network Inventory OverviewGE Smallworld Network Inventory Overview
GE Smallworld Network Inventory Overview
 
Spiceworks Intro
Spiceworks IntroSpiceworks Intro
Spiceworks Intro
 
FTTx Network Rollout - Realising Business Benefits with Smallworld
FTTx Network Rollout - Realising Business Benefits with SmallworldFTTx Network Rollout - Realising Business Benefits with Smallworld
FTTx Network Rollout - Realising Business Benefits with Smallworld
 

Similar to Physical and logical topologies in computer network and client server

Network Topologies.pptx
Network Topologies.pptxNetwork Topologies.pptx
Network Topologies.pptx
kulmiye2
 
Network Topologies in Simple (Logical, Physical and Types)
Network Topologies in Simple (Logical, Physical and Types)Network Topologies in Simple (Logical, Physical and Types)
FASE DE PLANEACION (INGLES)
FASE DE PLANEACION (INGLES)FASE DE PLANEACION (INGLES)
FASE DE PLANEACION (INGLES)
andreseams
 
Lesson 8
Lesson 8Lesson 8
Lesson 8
Gicheru Onesmus
 
Cristian
CristianCristian
Cristian
Cristianmd
 
Data Communication and Network - Transmission Medium and Switching
Data Communication and Network - Transmission Medium and SwitchingData Communication and Network - Transmission Medium and Switching
Data Communication and Network - Transmission Medium and Switching
Chandrakant Divate
 
For Introduction to Network1.What is computer networking means2.pdf
For Introduction to Network1.What is computer networking means2.pdfFor Introduction to Network1.What is computer networking means2.pdf
For Introduction to Network1.What is computer networking means2.pdf
fippsximenaal85949
 
Lecture2 networkclassification
Lecture2 networkclassificationLecture2 networkclassification
Lecture2 networkclassificationH K
 
Presentation on network topology
Presentation on network topologyPresentation on network topology
Presentation on network topology
Swarnima Tiwari
 
Network topologies
Network topologiesNetwork topologies
Network topologies
Jem Mercado
 
Networking hard copy (1)
Networking  hard copy (1)Networking  hard copy (1)
Networking hard copy (1)Ankita Shetty
 
Network topology 3D Animation
Network topology  3D  AnimationNetwork topology  3D  Animation
Network topology 3D Animation
Karan Singh
 
Topology
TopologyTopology
Topology
MdAnikKhan
 
Determine best fit topology copy
Determine best fit topology   copyDetermine best fit topology   copy
Determine best fit topology copy
Jaleto Sunkemo
 
Topography
TopographyTopography
Topography
rosu555
 
Computer network
Computer networkComputer network
Computer network
rajat jasuja
 
basiccomponentsofacomputernetwork-210820131631.pptx
basiccomponentsofacomputernetwork-210820131631.pptxbasiccomponentsofacomputernetwork-210820131631.pptx
basiccomponentsofacomputernetwork-210820131631.pptx
14941
 
Networking notes2
Networking notes2Networking notes2
Networking notes2
Rahim khaksar
 
Types Of Networks
Types Of NetworksTypes Of Networks
Types Of Networks
jia234
 

Similar to Physical and logical topologies in computer network and client server (20)

Network Topologies.pptx
Network Topologies.pptxNetwork Topologies.pptx
Network Topologies.pptx
 
Network Topologies in Simple (Logical, Physical and Types)
Network Topologies in Simple (Logical, Physical and Types)Network Topologies in Simple (Logical, Physical and Types)
Network Topologies in Simple (Logical, Physical and Types)
 
FASE DE PLANEACION (INGLES)
FASE DE PLANEACION (INGLES)FASE DE PLANEACION (INGLES)
FASE DE PLANEACION (INGLES)
 
Lesson 8
Lesson 8Lesson 8
Lesson 8
 
Cristian
CristianCristian
Cristian
 
Data Communication and Network - Transmission Medium and Switching
Data Communication and Network - Transmission Medium and SwitchingData Communication and Network - Transmission Medium and Switching
Data Communication and Network - Transmission Medium and Switching
 
For Introduction to Network1.What is computer networking means2.pdf
For Introduction to Network1.What is computer networking means2.pdfFor Introduction to Network1.What is computer networking means2.pdf
For Introduction to Network1.What is computer networking means2.pdf
 
Lecture2 networkclassification
Lecture2 networkclassificationLecture2 networkclassification
Lecture2 networkclassification
 
Presentation on network topology
Presentation on network topologyPresentation on network topology
Presentation on network topology
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Networking hard copy (1)
Networking  hard copy (1)Networking  hard copy (1)
Networking hard copy (1)
 
Network topology 3D Animation
Network topology  3D  AnimationNetwork topology  3D  Animation
Network topology 3D Animation
 
Topology
TopologyTopology
Topology
 
Determine best fit topology copy
Determine best fit topology   copyDetermine best fit topology   copy
Determine best fit topology copy
 
Topography
TopographyTopography
Topography
 
Network topology
Network topologyNetwork topology
Network topology
 
Computer network
Computer networkComputer network
Computer network
 
basiccomponentsofacomputernetwork-210820131631.pptx
basiccomponentsofacomputernetwork-210820131631.pptxbasiccomponentsofacomputernetwork-210820131631.pptx
basiccomponentsofacomputernetwork-210820131631.pptx
 
Networking notes2
Networking notes2Networking notes2
Networking notes2
 
Types Of Networks
Types Of NetworksTypes Of Networks
Types Of Networks
 

More from Satya P. Joshi

Intergroup Conflict Management.pptx
Intergroup Conflict Management.pptxIntergroup Conflict Management.pptx
Intergroup Conflict Management.pptx
Satya P. Joshi
 
Training methods in human resource managment
Training methods in human resource managmentTraining methods in human resource managment
Training methods in human resource managment
Satya P. Joshi
 
Selection tests in human resource management
Selection tests in human resource managementSelection tests in human resource management
Selection tests in human resource management
Satya P. Joshi
 
Interview and it’s types - human resource managmenet
Interview and it’s types - human resource managmenetInterview and it’s types - human resource managmenet
Interview and it’s types - human resource managmenet
Satya P. Joshi
 
Motivation, achievement theory, goal setting theory
Motivation, achievement theory, goal setting theoryMotivation, achievement theory, goal setting theory
Motivation, achievement theory, goal setting theory
Satya P. Joshi
 
Characteristics, objectives & challenges of human resource manager
Characteristics, objectives & challenges of human resource managerCharacteristics, objectives & challenges of human resource manager
Characteristics, objectives & challenges of human resource manager
Satya P. Joshi
 
Human Resource Planning
Human Resource PlanningHuman Resource Planning
Human Resource Planning
Satya P. Joshi
 
Nested queries in database
Nested queries in databaseNested queries in database
Nested queries in database
Satya P. Joshi
 
Technology and work design in Organizational Relation
Technology and work design in Organizational RelationTechnology and work design in Organizational Relation
Technology and work design in Organizational Relation
Satya P. Joshi
 
Techniques of achieving google quality of service
Techniques of achieving google quality of serviceTechniques of achieving google quality of service
Techniques of achieving google quality of service
Satya P. Joshi
 
Overview of digital communication in HSN and Multimedia
Overview of digital communication in HSN and MultimediaOverview of digital communication in HSN and Multimedia
Overview of digital communication in HSN and Multimedia
Satya P. Joshi
 
Introduction to human resource management
Introduction to human resource managementIntroduction to human resource management
Introduction to human resource management
Satya P. Joshi
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
Satya P. Joshi
 
Designing the supply chain network
Designing the supply chain networkDesigning the supply chain network
Designing the supply chain network
Satya P. Joshi
 
Introduction to Organizational Behavior and Organizational Relation
Introduction to Organizational Behavior and Organizational RelationIntroduction to Organizational Behavior and Organizational Relation
Introduction to Organizational Behavior and Organizational Relation
Satya P. Joshi
 
Selection tests and Reliability and Validity in HRM
Selection tests and Reliability and Validity in HRMSelection tests and Reliability and Validity in HRM
Selection tests and Reliability and Validity in HRM
Satya P. Joshi
 
Analog and digital signal system : digital logic
Analog and digital signal system : digital logicAnalog and digital signal system : digital logic
Analog and digital signal system : digital logic
Satya P. Joshi
 
Transmission media on Client server and high speed network
Transmission media on Client server and high speed networkTransmission media on Client server and high speed network
Transmission media on Client server and high speed network
Satya P. Joshi
 
Remote procedure call on client server computing
Remote procedure call on client server computingRemote procedure call on client server computing
Remote procedure call on client server computing
Satya P. Joshi
 
Performance tuning and optimization on client server
Performance tuning and optimization on client serverPerformance tuning and optimization on client server
Performance tuning and optimization on client server
Satya P. Joshi
 

More from Satya P. Joshi (20)

Intergroup Conflict Management.pptx
Intergroup Conflict Management.pptxIntergroup Conflict Management.pptx
Intergroup Conflict Management.pptx
 
Training methods in human resource managment
Training methods in human resource managmentTraining methods in human resource managment
Training methods in human resource managment
 
Selection tests in human resource management
Selection tests in human resource managementSelection tests in human resource management
Selection tests in human resource management
 
Interview and it’s types - human resource managmenet
Interview and it’s types - human resource managmenetInterview and it’s types - human resource managmenet
Interview and it’s types - human resource managmenet
 
Motivation, achievement theory, goal setting theory
Motivation, achievement theory, goal setting theoryMotivation, achievement theory, goal setting theory
Motivation, achievement theory, goal setting theory
 
Characteristics, objectives & challenges of human resource manager
Characteristics, objectives & challenges of human resource managerCharacteristics, objectives & challenges of human resource manager
Characteristics, objectives & challenges of human resource manager
 
Human Resource Planning
Human Resource PlanningHuman Resource Planning
Human Resource Planning
 
Nested queries in database
Nested queries in databaseNested queries in database
Nested queries in database
 
Technology and work design in Organizational Relation
Technology and work design in Organizational RelationTechnology and work design in Organizational Relation
Technology and work design in Organizational Relation
 
Techniques of achieving google quality of service
Techniques of achieving google quality of serviceTechniques of achieving google quality of service
Techniques of achieving google quality of service
 
Overview of digital communication in HSN and Multimedia
Overview of digital communication in HSN and MultimediaOverview of digital communication in HSN and Multimedia
Overview of digital communication in HSN and Multimedia
 
Introduction to human resource management
Introduction to human resource managementIntroduction to human resource management
Introduction to human resource management
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Designing the supply chain network
Designing the supply chain networkDesigning the supply chain network
Designing the supply chain network
 
Introduction to Organizational Behavior and Organizational Relation
Introduction to Organizational Behavior and Organizational RelationIntroduction to Organizational Behavior and Organizational Relation
Introduction to Organizational Behavior and Organizational Relation
 
Selection tests and Reliability and Validity in HRM
Selection tests and Reliability and Validity in HRMSelection tests and Reliability and Validity in HRM
Selection tests and Reliability and Validity in HRM
 
Analog and digital signal system : digital logic
Analog and digital signal system : digital logicAnalog and digital signal system : digital logic
Analog and digital signal system : digital logic
 
Transmission media on Client server and high speed network
Transmission media on Client server and high speed networkTransmission media on Client server and high speed network
Transmission media on Client server and high speed network
 
Remote procedure call on client server computing
Remote procedure call on client server computingRemote procedure call on client server computing
Remote procedure call on client server computing
 
Performance tuning and optimization on client server
Performance tuning and optimization on client serverPerformance tuning and optimization on client server
Performance tuning and optimization on client server
 

Recently uploaded

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Physical and logical topologies in computer network and client server

  • 3. Physical Topology  The physical layout of devices on a network.  Physical topology refers to the interconnected structure of a local area network (LAN).  Physical topology is the way that the devices on a network are arranged and how they communicate with each other.  The method employed to connect the physical devices on the network with the cables, and the type of cabling used, all constitute the physical topology.
  • 4. Bus Topology  The bus topology is often referred to as a "linear bus" because the computers are connected in a straight line.  It consists of a single cable that connects all of the computers in the network in a single line.  Computers on a bus topology network communicate by addressing data to a particular computer and sending out that data on the cable as electronic signals.
  • 5. Communication on Bus  Sending the signal  Signal bounce  Terminator
  • 6. 1.Sending the signal  Network data in the form of electronic signals is sent to all the computers on the network.  Only the computer whose address matches the address encoded in the original signal accepts the information. All other computers reject the data.  Because only one computer at a time can send data on a bus network, the number of computers attached to the bus will affect network performance.  The more computers there are on a bus, the more computers will be waiting to put data on the bus and, consequently, the slower the network will be.
  • 7. 2.Signal Bounce  Because the data, or electronic signal, is sent to the entire network, it travels from one end of the cable to the other.  If the signal is allowed to continue uninterrupted, it will keep bouncing back and forth along the cable and prevent other computers from sending signals.  Therefore, the signal must be stopped after it has had a chance to reach the proper destination address.
  • 8. 3. Terminator  Terminator is used to stop the signal from bouncing, a component called a terminator is placed at each end of the cable to absorb free signals.  Absorbing the signal clears the cable so that other computers can send data.
  • 9. Star Topology  In the star topology, cable segments from each computer are connected to a centralized component called a hub.  Signals are transmitted from the sending computer through the hub to all computers on the network.
  • 10.  The star network offers the advantage of centralized resources and management. However, because each computer is connected to a central point, it requires a great deal of cable in a large network installation.  If the central point fails, the entire network goes down.  If one computer—or the cable that connects it to the hub—fails on a star network, only the failed computer will not be able to send or receive network data. The rest of the network continues to function normally.
  • 11. Ring Topology  The ring topology connects computers on a single circle of cable.  Unlike the bus topology, there are no terminated ends.  The signals travel around the loop in one direction and pass through each computer, which can act as a repeater to boost the signal and send it on to the next computer  The failure of one computer can have an impact on the entire network.  One method of transmitting data around a ring is called token passing.
  • 12. Mesh Topology A mesh topology network offers superior redundancy and reliability.  In a mesh topology, each computer is connected to every other computer by separate cabling.  This configuration provides redundant paths throughout the network so that if one cable fails, another will take over the traffic.  these networks are expensive to install because they use a lot of cabling.  Often, a mesh topology will be used in conjunction with other topologies to form a hybrid topology.
  • 14. Hybrid Topology  Hybrid networks use a combination of any two or more topologies, in such a way that the resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.).  For example a tree network connected to a tree network is still a tree network topology.  A hybrid topology is always produced when two different basic network topologies are connected.  Two common examples for Hybrid network are: star ring network and star bus network
  • 15. Logical topology • IT IS THE ARRANGEMENT OF DEVICES ON A COMPUTER NETWORK AND HOW THEY COMMUNICATE WITH ONE ANOTHER. HOW DEVICES ARE CONNECTED TO THE NETWORK THROUGH THE ACTUAL CABLES THAT TRANSMIT DATA, OR THE PHYSICAL STRUCTURE OF THE NETWORK, IS CALLED THE PHYSICAL TOPOLOGY. PHYSICAL TOPOLOGY DEFINES HOW THE SYSTEMS ARE PHYSICALLY CONNECTED. IT REPRESENTS THE PHYSICAL LAYOUT OF THE DEVICES ON THE NETWORK. THE LOGICAL TOPOLOGY DEFINES HOW THE SYSTEMS COMMUNICATE ACROSS THE PHYSICAL TOPOLOGIES. • LOGICAL TOPOLOGIES ARE BOUND TO NETWORK PROTOCOLS AND DESCRIBE HOW DATA IS MOVED ACROSS THE NETWORK. • TWO OF THE MOST COMMON LOGICAL TOPOLOGIES ARE: BUS TOPOLOGY: ETHERNET USES THE LOGICAL BUS TOPOLOGY TO TRANSFER DATA. UNDER A BUS TOPOLOGY A NODE BROADCASTS THE DATA TO THE ENTIRE NETWORK. ALL OTHER NODES ON THE NETWORK HEAR THE DATA AND CHECK IF THE DATA IS INTENDED FOR THEM. RING TOPOLOGY: IN THIS TOPOLOGY, ONLY ONE NODE CAN BE ALLOWED