SlideShare a Scribd company logo
   the first work which deserves to be
    considered as the beginnings of
    topology is due to Euler. In 1736
    Euler published a paper on the
    solution of the Königsberg bridge
    problem which translates into English
    as The solution of a problem relating to
    the geometry of position .
   The configuration of a
    communication network of
    'Computer Science' in which the
    arrangement in nodes of a LAN
    is connected to each other is
    known as Topology. It is a term
    which defines Topology in a
    simple manner.
 StarTopology.
 Bus Topology

 Ring/Network Topology

 Tree/Extended Star

  Topology.
    This type Topology is often called a
    multi-port repeater. In a star
    topology, each device has a
    dedicated point to point link only
    to central controller, usually called
    a hub/server/host.
Advantages-          Disadvantages-
 Easy to install     Requires more

  and wire.            cable length
                       than a linear
   Easy to detect     topology. .
                      More
    faults and to
    remove parts.      expensive.
    The bus topology is the
    simplest and most
    common. It is often used
    when a network
    installation is small,
    simple, or temporary.
Advantages-                Disadvantages-
 In an active topology     Heavy network traffic

  network, the computers      can slow a bus
  regenerate signals and      considerably.
  are responsible for
  moving the data
  through the network.
 On a bus network, all

  the computer are
                              A break in the cable or
  connected to a single        lake of proper
  cable.                       termination can bring
                               the network down.
    In a ring topology, each
    computer is connected directly
    to the next computer in line,
    forming a circle of cable. It
    uses token to pass the
    information from one
    computer to another.
Advantages-              Disadvantages-
 All the computers       Failure of one
  have equal access to     computer can affect
  the network.             the whole network.
 Even with many          It is difficult to

  users, network           troubleshoot the ring
  performance is even.     network.
                          Adding or removing
 Allows error
                           computers disturbs
  checking, and            the network .
  acknowledgement.
 Among  all the Network
 Topologies the Tree
 Topology is a combination of
 the bus and the Star
 Topology.
Advantages-              Disadvantages-
                          Overall length of
 Point-to-point

  wiring for               each segment is
  individual segments.     limited by the type
                           of cabling used.
                          If the backbone line
   Supported by
                           breaks, the entire
    several hardware
                           segment goes down.
    and software
                          More difficult to
    venders.
                           configure and wire
                           than other
                           topologies
 The Network of Topology
 differs from place to place. But,
 however, all of them have their
 advantages & disadvantages. If
 the server problem occurs or
 server gets down, then
 Topology faces its failure
Prerna ppt.

More Related Content

What's hot

Network topology
Network topologyNetwork topology
Computer Network Topologies
Computer  Network TopologiesComputer  Network Topologies
Computer Network Topologies
Poorna Chandu Pati
 
Network topology
Network topologyNetwork topology
Network topologyilakkiya
 
Network topology And Its type
Network topology And Its typeNetwork topology And Its type
Network topology And Its type
Jaypee Institute of Information Technology
 
Network Topology
Network TopologyNetwork Topology
Network Topology
Malik Mehrose
 
Network topology
Network topologyNetwork topology
Network topology
Student
 
Network topology
Network topologyNetwork topology
Network topology
Pavan Kumar B N
 
Computer Network topology
Computer Network topologyComputer Network topology
Computer Network topology
Muhammad Bilal
 
Network topologies
Network topologiesNetwork topologies
Network topologiesTom Hanstead
 
NETWORK TOPOLOGY
NETWORK TOPOLOGYNETWORK TOPOLOGY
NETWORK TOPOLOGY
Harsh Kumar
 
Network topology
Network topologyNetwork topology
Network topology
Hardik Patel
 
Network topology
Network topologyNetwork topology
Network topology
Prakhar Maurya
 
Star topology
Star topologyStar topology
Network
NetworkNetwork
network topology
network topologynetwork topology
network topologyJency Pj
 
Bus topology ppt
Bus topology pptBus topology ppt
Bus topology ppt
Ananthkumar6965
 
Network Topology And Its Types
Network Topology And Its TypesNetwork Topology And Its Types
Network Topology And Its Types
SaadSaif6
 
NETWORK TOPOLOGIES (NETWORK TOPOLOGY)
NETWORK TOPOLOGIES (NETWORK TOPOLOGY)NETWORK TOPOLOGIES (NETWORK TOPOLOGY)
NETWORK TOPOLOGIES (NETWORK TOPOLOGY)
𝖆𝖑𝖕𝖍𝖆 𝖆𝖑𝖕𝖍𝖆
 
Topology presentation
Topology  presentationTopology  presentation
Topology presentationJobaida Nahar
 
Network topology by Dr. Gholkar D. R.
Network topology by Dr. Gholkar D. R.Network topology by Dr. Gholkar D. R.
Network topology by Dr. Gholkar D. R.
drgholkar
 

What's hot (20)

Network topology
Network topologyNetwork topology
Network topology
 
Computer Network Topologies
Computer  Network TopologiesComputer  Network Topologies
Computer Network Topologies
 
Network topology
Network topologyNetwork topology
Network topology
 
Network topology And Its type
Network topology And Its typeNetwork topology And Its type
Network topology And Its type
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Network topology
Network topologyNetwork topology
Network topology
 
Network topology
Network topologyNetwork topology
Network topology
 
Computer Network topology
Computer Network topologyComputer Network topology
Computer Network topology
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
NETWORK TOPOLOGY
NETWORK TOPOLOGYNETWORK TOPOLOGY
NETWORK TOPOLOGY
 
Network topology
Network topologyNetwork topology
Network topology
 
Network topology
Network topologyNetwork topology
Network topology
 
Star topology
Star topologyStar topology
Star topology
 
Network
NetworkNetwork
Network
 
network topology
network topologynetwork topology
network topology
 
Bus topology ppt
Bus topology pptBus topology ppt
Bus topology ppt
 
Network Topology And Its Types
Network Topology And Its TypesNetwork Topology And Its Types
Network Topology And Its Types
 
NETWORK TOPOLOGIES (NETWORK TOPOLOGY)
NETWORK TOPOLOGIES (NETWORK TOPOLOGY)NETWORK TOPOLOGIES (NETWORK TOPOLOGY)
NETWORK TOPOLOGIES (NETWORK TOPOLOGY)
 
Topology presentation
Topology  presentationTopology  presentation
Topology presentation
 
Network topology by Dr. Gholkar D. R.
Network topology by Dr. Gholkar D. R.Network topology by Dr. Gholkar D. R.
Network topology by Dr. Gholkar D. R.
 

Viewers also liked

Motivational presentation ppt
Motivational presentation pptMotivational presentation ppt
Motivational presentation pptladydeath1977
 
Winning with people - motivational presentation in Hindi in PDF
Winning with people - motivational presentation in Hindi in PDFWinning with people - motivational presentation in Hindi in PDF
Winning with people - motivational presentation in Hindi in PDF
Self-employed
 
Motivational PPT
Motivational PPTMotivational PPT
Motivational PPT
Firoj Md Shah
 
MOTIVATION POWERPOINT
MOTIVATION POWERPOINTMOTIVATION POWERPOINT
MOTIVATION POWERPOINT
Andrew Schwartz
 

Viewers also liked (6)

Motivational presentation ppt
Motivational presentation pptMotivational presentation ppt
Motivational presentation ppt
 
Winning with people - motivational presentation in Hindi in PDF
Winning with people - motivational presentation in Hindi in PDFWinning with people - motivational presentation in Hindi in PDF
Winning with people - motivational presentation in Hindi in PDF
 
Short Motivational Stories
Short Motivational StoriesShort Motivational Stories
Short Motivational Stories
 
Motivational PPT
Motivational PPTMotivational PPT
Motivational PPT
 
Motivation ppt
Motivation pptMotivation ppt
Motivation ppt
 
MOTIVATION POWERPOINT
MOTIVATION POWERPOINTMOTIVATION POWERPOINT
MOTIVATION POWERPOINT
 

Similar to Prerna ppt.

Best Topology
Best TopologyBest Topology
Best Topology
ami872
 
Types of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterTypes of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouter
AlidHasan4
 
Network topology
Network topologyNetwork topology
Network topology
lekshmik
 
Networktopology xii
Networktopology xiiNetworktopology xii
Networktopology xii
saltyp
 
Computer network
Computer  networkComputer  network
Computer network
Poorna Chandu Pati
 
Mcitp lec 5
Mcitp lec 5Mcitp lec 5
Mcitp lec 5
Ahmad Ramin Azizi
 
Network topologies 7
Network topologies 7Network topologies 7
Network topologies 7Kushal Gujral
 
Network topology ? Types of Network Toplogies:Bus, Ring, Mesh, Tree, Star, Hy...
Network topology ? Types of Network Toplogies:Bus, Ring, Mesh, Tree, Star, Hy...Network topology ? Types of Network Toplogies:Bus, Ring, Mesh, Tree, Star, Hy...
Network topology ? Types of Network Toplogies:Bus, Ring, Mesh, Tree, Star, Hy...
Surinder K. Mourya
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
Raj vardhan
 
Distributed Structure System
Distributed Structure SystemDistributed Structure System
Distributed Structure System
husnaina_akhtar
 
BASIC NETWORKING TOPOLOGIES
BASIC NETWORKING TOPOLOGIESBASIC NETWORKING TOPOLOGIES
BASIC NETWORKING TOPOLOGIES
Kirti Garg
 
network topology
network topologynetwork topology
network topology
harish pillai
 
Networktopology
NetworktopologyNetworktopology
Networktopology
Dr. Vardhan choubey
 
Network topology
Network topologyNetwork topology
Network topology
Nafizul Islam
 
7 topology ethernet
7 topology ethernet7 topology ethernet
7 topology ethernet
Samit Singh
 
Networking notes2
Networking notes2Networking notes2
Networking notes2
Rahim khaksar
 
Topology
TopologyTopology
Topology
Aviroop Mandal
 

Similar to Prerna ppt. (20)

Best Topology
Best TopologyBest Topology
Best Topology
 
report.pptx
report.pptxreport.pptx
report.pptx
 
Types of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterTypes of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouter
 
Network topology
Network topologyNetwork topology
Network topology
 
Networktopology xii
Networktopology xiiNetworktopology xii
Networktopology xii
 
Computer network
Computer  networkComputer  network
Computer network
 
Mcitp lec 5
Mcitp lec 5Mcitp lec 5
Mcitp lec 5
 
Mcitp lec 5
Mcitp lec 5Mcitp lec 5
Mcitp lec 5
 
Network topologies 7
Network topologies 7Network topologies 7
Network topologies 7
 
Network topology ? Types of Network Toplogies:Bus, Ring, Mesh, Tree, Star, Hy...
Network topology ? Types of Network Toplogies:Bus, Ring, Mesh, Tree, Star, Hy...Network topology ? Types of Network Toplogies:Bus, Ring, Mesh, Tree, Star, Hy...
Network topology ? Types of Network Toplogies:Bus, Ring, Mesh, Tree, Star, Hy...
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Distributed Structure System
Distributed Structure SystemDistributed Structure System
Distributed Structure System
 
BASIC NETWORKING TOPOLOGIES
BASIC NETWORKING TOPOLOGIESBASIC NETWORKING TOPOLOGIES
BASIC NETWORKING TOPOLOGIES
 
network topology
network topologynetwork topology
network topology
 
Networktopology
NetworktopologyNetworktopology
Networktopology
 
original
originaloriginal
original
 
Network topology
Network topologyNetwork topology
Network topology
 
7 topology ethernet
7 topology ethernet7 topology ethernet
7 topology ethernet
 
Networking notes2
Networking notes2Networking notes2
Networking notes2
 
Topology
TopologyTopology
Topology
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Prerna ppt.

  • 1.
  • 2.
  • 3. the first work which deserves to be considered as the beginnings of topology is due to Euler. In 1736 Euler published a paper on the solution of the Königsberg bridge problem which translates into English as The solution of a problem relating to the geometry of position .
  • 4. The configuration of a communication network of 'Computer Science' in which the arrangement in nodes of a LAN is connected to each other is known as Topology. It is a term which defines Topology in a simple manner.
  • 5.  StarTopology.  Bus Topology  Ring/Network Topology  Tree/Extended Star Topology.
  • 6. This type Topology is often called a multi-port repeater. In a star topology, each device has a dedicated point to point link only to central controller, usually called a hub/server/host.
  • 7.
  • 8. Advantages- Disadvantages-  Easy to install  Requires more and wire. cable length than a linear  Easy to detect topology. .  More faults and to remove parts. expensive.
  • 9. The bus topology is the simplest and most common. It is often used when a network installation is small, simple, or temporary.
  • 10.
  • 11. Advantages- Disadvantages-  In an active topology  Heavy network traffic network, the computers can slow a bus regenerate signals and considerably. are responsible for moving the data through the network.  On a bus network, all the computer are  A break in the cable or connected to a single lake of proper cable. termination can bring the network down.
  • 12. In a ring topology, each computer is connected directly to the next computer in line, forming a circle of cable. It uses token to pass the information from one computer to another.
  • 13.
  • 14. Advantages- Disadvantages-  All the computers  Failure of one have equal access to computer can affect the network. the whole network.  Even with many  It is difficult to users, network troubleshoot the ring performance is even. network.  Adding or removing  Allows error computers disturbs checking, and the network . acknowledgement.
  • 15.  Among all the Network Topologies the Tree Topology is a combination of the bus and the Star Topology.
  • 16.
  • 17. Advantages- Disadvantages-  Overall length of  Point-to-point wiring for each segment is individual segments. limited by the type of cabling used.  If the backbone line  Supported by breaks, the entire several hardware segment goes down. and software  More difficult to venders. configure and wire than other topologies
  • 18.  The Network of Topology differs from place to place. But, however, all of them have their advantages & disadvantages. If the server problem occurs or server gets down, then Topology faces its failure