SlideShare a Scribd company logo
Topology
 Topology is physical or logical arrangement of computer. The
physical topology of a network refers to the configuration of
cables, computers, and other peripherals.
 Physical topology should not be confused with logical topology
which is the method used to pass information between
workstations.
 It is the geometric representation of the relationship of all the
links and linking devices i.e. nodes to each other. Depending on
the need of an organization different arrangements of
computers are available.
Types of Topologies
Mesh Topology
Star Topology
Tree Topology
Bus Topology
Ring Topology
Mesh Topology
In mesh topology each node is
connected to every other node by direct links.
For n nodes , there would be n(n-1)/2 physical
links.

To accommodate that many links,
every device on the network must have n-1
input/output ports.
Every device has dedicated point to point link to
every other device.
Disadvantage
• The use of dedicated links will increase the
number of input/output ports.
• Installation and reconfiguration are difficult in
this topology.
• The hardware required to connect each other can
be prohibitively expensive.

• The cable length is much more in this topology
comparing to other.
Advantages
• The use of dedicated links guaranteed that each connection can
carry its own data.
• The Mesh topology does not have traffic congestion problems.
• Point to point links make fault identification and fault isolation easy
in this topology.
• It is also robust in nature. Of one link is down, all the rest of the
network can still continue.
• When every message sent travels along dedicated line, only
intended recipient sees it. Physical boundaries prevent other users
from gaining access to messages, so we can say that there is data
security.
Star Topology
• As we know that mesh topology have major drawback of
cabling that has been overcome here in star topology with a
special network device that is HUB.
• In star topology, each device has a dedicated point to point
link hub. The devices are not directly linked to each other.
• A star topology does not allow direct traffic between devices.
There devices can only communicate via the hub.
Advantages
• It is less expensive than mesh topology.
• Each device needs only one link and one input port to connect it to any
number of other.
• It is easy to install and reconfigure.
• Less cabling is required.
• Moves and deletion involves only connection between the device and the
hub.
• Robustness i.e. if one link fails, only that link is affected and so helps in
easy fault identification and fault isolation.
• Hub is used to monitor link problems and by pass defective links.
Disadvantages
• Two terminals/devices can’t interact directly
i.e. they have to go via central controller hub.
This leads to no privacy in the network.

• The network’s dependence on the main
computer is more i.e. if the central computer
(HUB) breaks down the entire network stops
functioning.
Tree Topology
• The tree topology is a variation of a star. The tree topology
requires the computer to be linked in a hierarchical way.
• Nodes in a tree are linked to a central hub that controls the
traffic to the network.
• Not every device plugs directly into the central hub. the
majority of devices connect to a secondary hub that in turn
is connected to the central hub.
• A central hub in the tree is an active hub. An active hub
contains a repeater.
Tree Topology
• Repeater is a hardware device that regenerates the
received bit patterns before sending them out.
• The secondary hubs may be active or passive hubs.
• A passive hub provides a simple physical connection
between the attached devices.
• The packets carrying the addresses of the destination
nodes should have the complete address i.e. all the
nodes above in the hierarchy must also have to be
mentioned.
Advantages
• Point to point wiring for individual segments.
• Supported by several hardware and software
vendors.
Disadvantages
• Overall length of each segment is limited by
the type of cabling used.
• Id the backbone line breaks, the entire
segment goes down.
• More difficult to configure and wire than
other topologies.
Bus Topology
• A linear bus topology consists of a main run of cable
with a terminator at each end.
• All nodes are connected to the linear cable.
• Ethernet and Local Talk Networks use a linear bus
topology.
• This topology is a multipoint configuration. One long
cable acts as backbone to link all the devices in the
network. All nodes are connected to bus that runs
through the network.
Bus Topology
• Drop line is a connection running between the device an
the main cable.
• A tap is a connector that either splices into the main cable.
• As a signal travels along the backbone, some of its energy is
transformed into heat.
• Signal becomes weaker and weaker when farther it has to
travel.

• There is a limit on the number of taps a bus can support
depending on the distance between those taps.
Advantages
• Easy to install. Easy to connect a computer or
peripheral to linear bus. Requires less cable
length.
• Backbone cable can be laid along the most
efficient path, then connected to the nodes by
drop line of various length.
• Only the backbone cable stretches through the
entire facility. Each drop line has to reach only as
far as the nearest point on the backbone.
Disadvantages
• Entire network shuts down if there is a break in
the main cable.
• Terminators are required at both ends of the
backbone cable.
• Difficult to identify the problem if the entire
network shuts down.

• Not meant to be used as a stand alone solution in
a large building.
Ring Topology
• In a ring topology, each device has dedicated point to
point line configuration only with two devices on either
side or it.
• A signal is passed along the ring in one direction from
device to device until it reaches its destination.
• Each device in the ring incorporates a repeater. When a
device receives a signal intended for another device.
• To connect n devices in a ring topology we need n
cable links.
Advantages
• A ring is relatively easy to install and reconfigure, each
device is linked only to its immediate neighbours.
• To add or delete a device requires moving only two
connections. The only constraints are media and traffic
considerations.
• Fault isolation is simplifies. In a ring a signal is
circulating at all times. If one device does not receive a
signal within a specified period. It can issue an alarm.
The alarm alerts the network operator of the problem
and its locations.
Disadvantages
• Supports unidirectional traffic.
• In a simple ring, a break in the ring can disable
the entire network. This weakness can be
solved by using dual ring.

More Related Content

What's hot

Presentation on topology
Presentation on topologyPresentation on topology
Presentation on topology
kalyan kumar
 
networking
networkingnetworking
networking
Pooja Dhiman
 
Networks topologies Lec#2
Networks topologies Lec#2Networks topologies Lec#2
Networks topologies Lec#2
Punjab and Superior College, Pakpattan
 
Network topology And Its Types
Network topology And Its Types Network topology And Its Types
Network topology And Its Types
Jaypee Institute of Information Technology
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologies
Ayush0734
 
Computer network
Computer networkComputer network
Computer network
Abdul Wahab
 
Topology
TopologyTopology
STAR TOPOLOGY
STAR TOPOLOGY STAR TOPOLOGY
STAR TOPOLOGY
Nets international LLC
 
Star topology ppt
Star topology pptStar topology ppt
Star topology ppt
Ananthkumar6965
 
Computer Network topology
Computer Network topologyComputer Network topology
Computer Network topology
Muhammad Bilal
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application ppt
Nitesh Dubey
 
Network topology
Network topologyNetwork topology
Network Topology
Network Topology Network Topology
Network Topology
Ajay Singh Rawat
 
Ring topology ppt
Ring topology pptRing topology ppt
Ring topology ppt
Ananthkumar6965
 
Network topology
Network topologyNetwork topology
Network topologyilakkiya
 
Topology presentation-sachin noire
Topology presentation-sachin noireTopology presentation-sachin noire
Topology presentation-sachin noire
sachin kumar
 
Networking
NetworkingNetworking
Networking
Palash Sachan
 
Network topology
Network topologyNetwork topology
Network topology
AnindyaNag5
 

What's hot (20)

Presentation on topology
Presentation on topologyPresentation on topology
Presentation on topology
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
networking
networkingnetworking
networking
 
Networks topologies Lec#2
Networks topologies Lec#2Networks topologies Lec#2
Networks topologies Lec#2
 
Network topology And Its Types
Network topology And Its Types Network topology And Its Types
Network topology And Its Types
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologies
 
Computer network
Computer networkComputer network
Computer network
 
Topology
TopologyTopology
Topology
 
STAR TOPOLOGY
STAR TOPOLOGY STAR TOPOLOGY
STAR TOPOLOGY
 
Star topology ppt
Star topology pptStar topology ppt
Star topology ppt
 
Computer Network topology
Computer Network topologyComputer Network topology
Computer Network topology
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application ppt
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Network topology
Network topologyNetwork topology
Network topology
 
Network Topology
Network Topology Network Topology
Network Topology
 
Ring topology ppt
Ring topology pptRing topology ppt
Ring topology ppt
 
Network topology
Network topologyNetwork topology
Network topology
 
Topology presentation-sachin noire
Topology presentation-sachin noireTopology presentation-sachin noire
Topology presentation-sachin noire
 
Networking
NetworkingNetworking
Networking
 
Network topology
Network topologyNetwork topology
Network topology
 

Viewers also liked

Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point ProtocolPhan Vuong
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
Siddique Ibrahim
 
Geometry, Topology, and all of Your Wildest Dreams Will Come True
Geometry, Topology, and all of Your Wildest Dreams Will Come TrueGeometry, Topology, and all of Your Wildest Dreams Will Come True
Geometry, Topology, and all of Your Wildest Dreams Will Come True
Don Sheehy
 
Service Primitives for Internet Scale Applications
Service Primitives for Internet Scale ApplicationsService Primitives for Internet Scale Applications
Service Primitives for Internet Scale Applications
Amr Awadallah
 
PPP (Point to Point Protocol)
PPP (Point to Point Protocol)PPP (Point to Point Protocol)
PPP (Point to Point Protocol)
Ali Jafar
 
CAD Topology and Geometry Basics
CAD Topology and Geometry BasicsCAD Topology and Geometry Basics
CAD Topology and Geometry BasicsAndrey Dankevich
 
Introduction to PPP
Introduction to PPPIntroduction to PPP
Introduction to PPP
Frank Fang Kuo Yu
 
802.15.5 mesh topology
802.15.5  mesh topology802.15.5  mesh topology
802.15.5 mesh topology
sunil raj kumar
 
IPV4 vs IPV6
IPV4 vs IPV6IPV4 vs IPV6
IPV4 vs IPV6
Devang Doshi
 
Physical and logical topologies in computer network and client server
Physical  and logical topologies in computer network and client serverPhysical  and logical topologies in computer network and client server
Physical and logical topologies in computer network and client server
Satya P. Joshi
 
Csma
CsmaCsma
Point to-point-protocol
Point to-point-protocolPoint to-point-protocol
Point to-point-protocolamigurumi21
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devicesKunal Bhansali
 
Network topology
Network topologyNetwork topology
Network topology
lekshmik
 

Viewers also liked (20)

Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 
Topology
TopologyTopology
Topology
 
Geometry, Topology, and all of Your Wildest Dreams Will Come True
Geometry, Topology, and all of Your Wildest Dreams Will Come TrueGeometry, Topology, and all of Your Wildest Dreams Will Come True
Geometry, Topology, and all of Your Wildest Dreams Will Come True
 
1.network topology
1.network topology1.network topology
1.network topology
 
Service Primitives for Internet Scale Applications
Service Primitives for Internet Scale ApplicationsService Primitives for Internet Scale Applications
Service Primitives for Internet Scale Applications
 
Hardware3
Hardware3Hardware3
Hardware3
 
PPP (Point to Point Protocol)
PPP (Point to Point Protocol)PPP (Point to Point Protocol)
PPP (Point to Point Protocol)
 
CAD Topology and Geometry Basics
CAD Topology and Geometry BasicsCAD Topology and Geometry Basics
CAD Topology and Geometry Basics
 
Introduction to PPP
Introduction to PPPIntroduction to PPP
Introduction to PPP
 
Ch 17
Ch 17Ch 17
Ch 17
 
802.15.5 mesh topology
802.15.5  mesh topology802.15.5  mesh topology
802.15.5 mesh topology
 
IPV4 vs IPV6
IPV4 vs IPV6IPV4 vs IPV6
IPV4 vs IPV6
 
Physical and logical topologies in computer network and client server
Physical  and logical topologies in computer network and client serverPhysical  and logical topologies in computer network and client server
Physical and logical topologies in computer network and client server
 
Csma
CsmaCsma
Csma
 
Point to-point-protocol
Point to-point-protocolPoint to-point-protocol
Point to-point-protocol
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devices
 
Ip v4 & ip v6
Ip v4 & ip v6Ip v4 & ip v6
Ip v4 & ip v6
 
CSMA/CD
CSMA/CDCSMA/CD
CSMA/CD
 
Network topology
Network topologyNetwork topology
Network topology
 

Similar to Topology

network topology _computer networks.pptx
network  topology _computer networks.pptxnetwork  topology _computer networks.pptx
network topology _computer networks.pptx
ManimegalaM3
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
Shamima Akther
 
networktopology-final.pptx
networktopology-final.pptxnetworktopology-final.pptx
networktopology-final.pptx
BhuvanaR13
 
Topology in Computer Network.pptx
Topology in Computer Network.pptxTopology in Computer Network.pptx
Topology in Computer Network.pptx
454Saif
 
networktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdfnetworktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdf
amanchaube0143
 
networktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdfnetworktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdf
amanchaube0143
 
05 network typologies
05 network typologies05 network typologies
05 network typologies
Jadavsejal
 
Network topologies
Network topologiesNetwork topologies
Network topologies
Amitabh Shukla
 
networktopology.pptx
networktopology.pptxnetworktopology.pptx
networktopology.pptx
mani651780
 
3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2
JAIGANESH SEKAR
 
Unit2
Unit2Unit2
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
SuratSingh18
 
Presentation2-2.pptx
Presentation2-2.pptxPresentation2-2.pptx
Presentation2-2.pptx
ZainabShahzad9
 
sp...mads
sp...madssp...mads
sp...madspgj17
 
Network topologies
Network topologiesNetwork topologies
Network topologies
Shripal Oswal
 
lecture 2,3.pdf
lecture 2,3.pdflecture 2,3.pdf
lecture 2,3.pdf
useless45
 
Network topologies
Network topologiesNetwork topologies
Network topologies
Chirag Nag
 
Types of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterTypes of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouter
AlidHasan4
 
topology presentation.ppt
topology presentation.ppttopology presentation.ppt
topology presentation.ppt
Faizanshah76
 

Similar to Topology (20)

network topology _computer networks.pptx
network  topology _computer networks.pptxnetwork  topology _computer networks.pptx
network topology _computer networks.pptx
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
networktopology-final.pptx
networktopology-final.pptxnetworktopology-final.pptx
networktopology-final.pptx
 
Topology in Computer Network.pptx
Topology in Computer Network.pptxTopology in Computer Network.pptx
Topology in Computer Network.pptx
 
networktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdfnetworktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdf
 
networktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdfnetworktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdf
 
05 network typologies
05 network typologies05 network typologies
05 network typologies
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
networktopology.pptx
networktopology.pptxnetworktopology.pptx
networktopology.pptx
 
3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2
 
Unit2
Unit2Unit2
Unit2
 
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
 
Presentation2-2.pptx
Presentation2-2.pptxPresentation2-2.pptx
Presentation2-2.pptx
 
sp...mads
sp...madssp...mads
sp...mads
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
lecture 2,3.pdf
lecture 2,3.pdflecture 2,3.pdf
lecture 2,3.pdf
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Types of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterTypes of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouter
 
Krisom
KrisomKrisom
Krisom
 
topology presentation.ppt
topology presentation.ppttopology presentation.ppt
topology presentation.ppt
 

More from One97 Communications Limited

Er. Model Of Hospital Management
Er. Model Of Hospital ManagementEr. Model Of Hospital Management
Er. Model Of Hospital Management
One97 Communications Limited
 
Financial
FinancialFinancial
Railway
RailwayRailway
Library
LibraryLibrary
Fcfs Cpu Scheduling With Gantt Chart
Fcfs Cpu Scheduling With Gantt ChartFcfs Cpu Scheduling With Gantt Chart
Fcfs Cpu Scheduling With Gantt Chart
One97 Communications Limited
 
Neural Interfacing
Neural Interfacing Neural Interfacing
Neural Interfacing
One97 Communications Limited
 
Blue eye technology
Blue eye technology Blue eye technology
Blue eye technology
One97 Communications Limited
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
One97 Communications Limited
 
Backtrack
BacktrackBacktrack
Protect Folders without using any Software
Protect Folders without using any SoftwareProtect Folders without using any Software
Protect Folders without using any Software
One97 Communications Limited
 
Introduction to Java Programming
Introduction to Java ProgrammingIntroduction to Java Programming
Introduction to Java Programming
One97 Communications Limited
 
WAP to invoke constructors using super keyword in java
WAP to invoke constructors using super keyword in javaWAP to invoke constructors using super keyword in java
WAP to invoke constructors using super keyword in java
One97 Communications Limited
 
WAP to find out whether the number is prime or not in java
WAP to find out whether the number is prime or not in javaWAP to find out whether the number is prime or not in java
WAP to find out whether the number is prime or not in java
One97 Communications Limited
 
Overriding abstract in java
Overriding abstract in javaOverriding abstract in java
Overriding abstract in java
One97 Communications Limited
 
How to achieve multiple inheritances by using interface in java
How to achieve multiple inheritances by using interface in java How to achieve multiple inheritances by using interface in java
How to achieve multiple inheritances by using interface in java
One97 Communications Limited
 
Method overriding in java
Method overriding in javaMethod overriding in java
Method overriding in java
One97 Communications Limited
 
WAP to implement inheritance and overloading methods in java
WAP to implement inheritance and overloading methods in javaWAP to implement inheritance and overloading methods in java
WAP to implement inheritance and overloading methods in java
One97 Communications Limited
 
program on Function overloading in java
program on  Function overloading in javaprogram on  Function overloading in java
program on Function overloading in java
One97 Communications Limited
 
Program on usage of Final keyword in java
Program on usage of  Final keyword in javaProgram on usage of  Final keyword in java
Program on usage of Final keyword in java
One97 Communications Limited
 
WAP to initialize different objects with different values in java
WAP to initialize different objects with different values in javaWAP to initialize different objects with different values in java
WAP to initialize different objects with different values in java
One97 Communications Limited
 

More from One97 Communications Limited (20)

Er. Model Of Hospital Management
Er. Model Of Hospital ManagementEr. Model Of Hospital Management
Er. Model Of Hospital Management
 
Financial
FinancialFinancial
Financial
 
Railway
RailwayRailway
Railway
 
Library
LibraryLibrary
Library
 
Fcfs Cpu Scheduling With Gantt Chart
Fcfs Cpu Scheduling With Gantt ChartFcfs Cpu Scheduling With Gantt Chart
Fcfs Cpu Scheduling With Gantt Chart
 
Neural Interfacing
Neural Interfacing Neural Interfacing
Neural Interfacing
 
Blue eye technology
Blue eye technology Blue eye technology
Blue eye technology
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Backtrack
BacktrackBacktrack
Backtrack
 
Protect Folders without using any Software
Protect Folders without using any SoftwareProtect Folders without using any Software
Protect Folders without using any Software
 
Introduction to Java Programming
Introduction to Java ProgrammingIntroduction to Java Programming
Introduction to Java Programming
 
WAP to invoke constructors using super keyword in java
WAP to invoke constructors using super keyword in javaWAP to invoke constructors using super keyword in java
WAP to invoke constructors using super keyword in java
 
WAP to find out whether the number is prime or not in java
WAP to find out whether the number is prime or not in javaWAP to find out whether the number is prime or not in java
WAP to find out whether the number is prime or not in java
 
Overriding abstract in java
Overriding abstract in javaOverriding abstract in java
Overriding abstract in java
 
How to achieve multiple inheritances by using interface in java
How to achieve multiple inheritances by using interface in java How to achieve multiple inheritances by using interface in java
How to achieve multiple inheritances by using interface in java
 
Method overriding in java
Method overriding in javaMethod overriding in java
Method overriding in java
 
WAP to implement inheritance and overloading methods in java
WAP to implement inheritance and overloading methods in javaWAP to implement inheritance and overloading methods in java
WAP to implement inheritance and overloading methods in java
 
program on Function overloading in java
program on  Function overloading in javaprogram on  Function overloading in java
program on Function overloading in java
 
Program on usage of Final keyword in java
Program on usage of  Final keyword in javaProgram on usage of  Final keyword in java
Program on usage of Final keyword in java
 
WAP to initialize different objects with different values in java
WAP to initialize different objects with different values in javaWAP to initialize different objects with different values in java
WAP to initialize different objects with different values in java
 

Recently uploaded

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 

Recently uploaded (20)

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 

Topology

  • 1. Topology  Topology is physical or logical arrangement of computer. The physical topology of a network refers to the configuration of cables, computers, and other peripherals.  Physical topology should not be confused with logical topology which is the method used to pass information between workstations.  It is the geometric representation of the relationship of all the links and linking devices i.e. nodes to each other. Depending on the need of an organization different arrangements of computers are available.
  • 2. Types of Topologies Mesh Topology Star Topology Tree Topology Bus Topology Ring Topology
  • 3. Mesh Topology In mesh topology each node is connected to every other node by direct links. For n nodes , there would be n(n-1)/2 physical links. To accommodate that many links, every device on the network must have n-1 input/output ports. Every device has dedicated point to point link to every other device.
  • 4. Disadvantage • The use of dedicated links will increase the number of input/output ports. • Installation and reconfiguration are difficult in this topology. • The hardware required to connect each other can be prohibitively expensive. • The cable length is much more in this topology comparing to other.
  • 5. Advantages • The use of dedicated links guaranteed that each connection can carry its own data. • The Mesh topology does not have traffic congestion problems. • Point to point links make fault identification and fault isolation easy in this topology. • It is also robust in nature. Of one link is down, all the rest of the network can still continue. • When every message sent travels along dedicated line, only intended recipient sees it. Physical boundaries prevent other users from gaining access to messages, so we can say that there is data security.
  • 6. Star Topology • As we know that mesh topology have major drawback of cabling that has been overcome here in star topology with a special network device that is HUB. • In star topology, each device has a dedicated point to point link hub. The devices are not directly linked to each other. • A star topology does not allow direct traffic between devices. There devices can only communicate via the hub.
  • 7. Advantages • It is less expensive than mesh topology. • Each device needs only one link and one input port to connect it to any number of other. • It is easy to install and reconfigure. • Less cabling is required. • Moves and deletion involves only connection between the device and the hub. • Robustness i.e. if one link fails, only that link is affected and so helps in easy fault identification and fault isolation. • Hub is used to monitor link problems and by pass defective links.
  • 8. Disadvantages • Two terminals/devices can’t interact directly i.e. they have to go via central controller hub. This leads to no privacy in the network. • The network’s dependence on the main computer is more i.e. if the central computer (HUB) breaks down the entire network stops functioning.
  • 9. Tree Topology • The tree topology is a variation of a star. The tree topology requires the computer to be linked in a hierarchical way. • Nodes in a tree are linked to a central hub that controls the traffic to the network. • Not every device plugs directly into the central hub. the majority of devices connect to a secondary hub that in turn is connected to the central hub. • A central hub in the tree is an active hub. An active hub contains a repeater.
  • 10. Tree Topology • Repeater is a hardware device that regenerates the received bit patterns before sending them out. • The secondary hubs may be active or passive hubs. • A passive hub provides a simple physical connection between the attached devices. • The packets carrying the addresses of the destination nodes should have the complete address i.e. all the nodes above in the hierarchy must also have to be mentioned.
  • 11. Advantages • Point to point wiring for individual segments. • Supported by several hardware and software vendors.
  • 12. Disadvantages • Overall length of each segment is limited by the type of cabling used. • Id the backbone line breaks, the entire segment goes down. • More difficult to configure and wire than other topologies.
  • 13. Bus Topology • A linear bus topology consists of a main run of cable with a terminator at each end. • All nodes are connected to the linear cable. • Ethernet and Local Talk Networks use a linear bus topology. • This topology is a multipoint configuration. One long cable acts as backbone to link all the devices in the network. All nodes are connected to bus that runs through the network.
  • 14. Bus Topology • Drop line is a connection running between the device an the main cable. • A tap is a connector that either splices into the main cable. • As a signal travels along the backbone, some of its energy is transformed into heat. • Signal becomes weaker and weaker when farther it has to travel. • There is a limit on the number of taps a bus can support depending on the distance between those taps.
  • 15. Advantages • Easy to install. Easy to connect a computer or peripheral to linear bus. Requires less cable length. • Backbone cable can be laid along the most efficient path, then connected to the nodes by drop line of various length. • Only the backbone cable stretches through the entire facility. Each drop line has to reach only as far as the nearest point on the backbone.
  • 16. Disadvantages • Entire network shuts down if there is a break in the main cable. • Terminators are required at both ends of the backbone cable. • Difficult to identify the problem if the entire network shuts down. • Not meant to be used as a stand alone solution in a large building.
  • 17. Ring Topology • In a ring topology, each device has dedicated point to point line configuration only with two devices on either side or it. • A signal is passed along the ring in one direction from device to device until it reaches its destination. • Each device in the ring incorporates a repeater. When a device receives a signal intended for another device. • To connect n devices in a ring topology we need n cable links.
  • 18. Advantages • A ring is relatively easy to install and reconfigure, each device is linked only to its immediate neighbours. • To add or delete a device requires moving only two connections. The only constraints are media and traffic considerations. • Fault isolation is simplifies. In a ring a signal is circulating at all times. If one device does not receive a signal within a specified period. It can issue an alarm. The alarm alerts the network operator of the problem and its locations.
  • 19. Disadvantages • Supports unidirectional traffic. • In a simple ring, a break in the ring can disable the entire network. This weakness can be solved by using dual ring.