SlideShare a Scribd company logo
Unit 1 : Information Technology
Dr.Durga wati Kushwaha
Assistant Professor
Network Topology
ā€¢ Network topology is the arrangement of the elements (links, nodes, etc.) of a communication network.
ā€¢ Network topology can be used to define or describe the arrangement of various types of
telecommunication networks, including command and control radio networks, industrial field
busses and computer networks.
ā€¢ Network topology is the topologicalstructure of a network and may be depicted physically or logically.
ā€¢ It is an application of graph theory wherein communicating devices are modeled as nodes and the
connections between the devices are modeled as links or lines between the nodes.
ā€¢ Physical topology is the placement of the various components of a network (e.g., device location and
cable installation), while logical topology illustrates how data flows within a network.
ā€¢ Examples of network topologies are found in local area networks (LAN), a common computer network
installation.
Topologies
ā€¢ Physical topology :
ļƒ¼The transmission medium layout used to link devices is the physical topology of the
network. For conductive or fiber optical mediums, this refers to the layout of cabling,
the locations of nodes, and the links between the nodes and the cabling.
ļƒ¼ The physical topology of a network is determined by the capabilities of the network
access devices and media, the level of control or fault tolerance desired, and the cost
associated with cabling or telecommunication circuits.
ā€¢ Logical topology :
ā€¢ Logical topology is the way that the signals act on the network media, or the way that
the data passes through the network from one device to the next without regard to
the physical interconnection of the devices.
ā€¢ A network's logical topology is not necessarily the same as its physical topology.
Types of Network Topology
Contdā€¦.
Bus topology
ā€¢ The bus topology is designed in such a way that all the stations are connected through a single cable known as a backbone
cable.
ā€¢ Each node is either connected to the backbone cable by drop cable or directly connected to the backbone cable.
ā€¢ When a node wants to send a message over the network, it puts a message over the network. All the stations available in
the network will receive the message whether it has been addressed or not.
ā€¢ The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks.
ā€¢ The configuration of a bus topology is quite simpler as compared to other topologies.
ā€¢ The backbone cable is considered as a "single lane" through which the message is broadcast to all the stations.
ā€¢ The most common access method of the bus topologies is CSMA (Carrier Sense Multiple Access).
CSMA: It is a media access control used to control the data flow so that data integrity is maintained,
i.e., the packets do not get lost. There are two alternative ways of handling the problems that occur when
two nodes send the messages simultaneously.
ā€¢CSMA CD: CSMA CD (Collision detection) is an access method used to detect the collision. Once
the collision is detected, the sender will stop transmitting the data. Therefore, it works on "recovery
after the collision".
ā€¢CSMA CA: CSMA CA (Collision Avoidance) is an access method used to avoid the collision by
checking whether the transmission media is busy or not. If busy, then the sender waits until the media
becomes idle. This technique effectively reduces the possibility of the collision. It does not work on
"recovery after the collision".
Contdā€¦.
Advantages
ā€¢ Low-cost cable
ā€¢ Moderate data speeds
ā€¢ Familiar technology
ā€¢ Limited failure
Disadvantages
ā€¢ Extensive cabling
ā€¢ Difficult troubleshooting
ā€¢ Signal interference
ā€¢ Reconfiguration difficult
ā€¢ Attenuation (loss of signal leads to
communication issues. Repeaters are used to
regenerate the signal.)
ā€¢ Ring Topology:
ļƒ¼Ring topology is like a bus topology, but with connected ends.
ļƒ¼The node that receives the message from the previous computer will retransmit to the next node.
ļƒ¼The data flows in one direction, i.e., it is unidirectional.
ļƒ¼The data flows in a single loop continuously known as an endless loop.
ļƒ¼It has no terminated ends, i.e., each node is connected to other node and having no termination point.
ļƒ¼The data in a ring topology flow in a clockwise direction.
ļƒ¼The most common access method of the ring topology is token passing.
ā€¢ Token passing: It is a network access method in which token is passed from one node to another node.
ā€¢ Token: It is a frame that circulates around the network.
Working of Token passing
ā€¢ A token moves around the network, and it is passed from computer to computer until it reaches the
destination.
ā€¢ The sender modifies the token by putting the address along with the data.
ā€¢ The data is passed from one device to another device until the destination address matches.
ā€¢ Once the token received by the destination device, then it sends the acknowledgment to the sender.
ā€¢ In a ring topology, a token is used as a carrier.
Contdā€¦.
Contdā€¦.
Advantages
ā€¢ Network Management
ā€¢ Product availability
ā€¢ Cost
ā€¢ Reliable
Disadvantages
ā€¢ Difficult troubleshooting
ā€¢ Failure
ā€¢ Reconfiguration difficult
ā€¢ Delay
ā€¢ Star Topology
Contdā€¦.
ā€¢Star topology is an arrangement of the network in which every node is
connected to the central hub, switch or a central computer.
ā€¢The central computer is known as a server, and the peripheral devices
attached to the server are known as clients.
ā€¢Coaxial cable or RJ-45 cables are used to connect the computers.
ā€¢Hubs or Switches are mainly used as connection devices in a physical
star topology.
ā€¢Star topology is the most popular topology in network implementation.
Contdā€¦.
Advantages
ā€¢ Efficient troubleshooting
ā€¢ Network control
ā€¢ Limited failure
ā€¢ Familiar technology
ā€¢ Easily expandable
ā€¢ Cost effective
ā€¢ High data speeds
Disadvantages
ā€¢ A Central point of failure
ā€¢ Cable
ā€¢ Tree topology:
ļƒ¼Combines the characteristics of bus topology and star topology.
ļƒ¼A tree topology is a type of structure in which all the computers are connected with each other in
hierarchical fashion.
ļƒ¼The top-most node in tree topology is known as a root node, and all other nodes are the
descendants of the root node.
ļƒ¼There is only one path exists between two nodes for the data transmission. Thus, it forms a
parent-child hierarchy.
Contdā€¦.
Advantages Disadvantages
Support for broadband transmission Difficult troubleshooting
Easily expandable & manageable High cost
Error detection Failure
Limited failure Reconfiguration difficult
Point-to-point wiring
ā€¢ Mesh topology
ļƒ¼Mesh technology is an arrangement of the network in which computers are
interconnected with each other through various redundant connections.
ļƒ¼There are multiple paths from one computer to another computer.
ļƒ¼It does not contain the switch, hub or any central computer which acts as a central point
of communication.
ļƒ¼The Internet is an example of the mesh topology.
ļƒ¼Mesh topology is mainly used for WAN implementations where communication failures
are a critical concern.
ļƒ¼Mesh topology is mainly used for wireless networks.
ļƒ¼Mesh topology can be formed by using the formula:
Number of cables = (n*(n-1))/2;
Where n is the number of nodes that represents the network.
Contdā€¦.
ā€¢ Mesh topology is divided into two categories:
ļƒ¼Fully connected mesh topology
ļƒ¼Partially connected mesh topology
Contdā€¦.
ā€¢Full Mesh Topology: In a full mesh topology, each computer is connected to all the computers available in the network.
ā€¢Partial Mesh Topology: In a partial mesh topology, not all but certain computers are connected to those computers with which
they communicate frequently.
Advantages Disadvantages
Reliable Cost
Fast Communication Management is difficult
Easier Reconfiguration Efficiency( redundant connections are high that reduces
the efficiency of the network)
ā€¢ Hybrid Topology Contdā€¦.
ā€¢The combination of various different topologies is known as Hybrid
topology.
ā€¢A Hybrid topology is a connection between different links and nodes to
transfer the data.
ā€¢When two or more different topologies are combined together is termed as
Hybrid topology and if similar topologies are connected with each other will
not result in Hybrid topology.
ā€¢For example, if there exist a ring topology in one branch of ICICI bank and
bus topology in another branch of ICICI bank, connecting these two
topologies will result in Hybrid topology.
Advantages Disadvantages
Reliable Complex design
Scalable Costly Hub
Flexible Costly infrastructure
Effective
Transmission modes
ā€¢The way in which data is transmitted from one device to another device is known as transmission mode.
ā€¢The transmission mode is also known as the communication mode.
ā€¢Each communication channel has a direction associated with it, and transmission media provide the
direction. Therefore, the transmission mode is also known as a directional mode.
ā€¢The transmission mode is defined in the physical layer.
ā€¢The Transmission mode is divided into three categories:
ļƒ˜ Simplex mode
ļƒ˜ Half-duplex mode
ļƒ˜ Full-duplex mode
ā€¢ Simplex mode
Contdā€¦.
ā€¢In Simplex mode, the communication is unidirectional, i.e., the data flow in one direction.
ā€¢A device can only send the data but cannot receive it or it can receive the data but cannot send the data.
ā€¢This transmission mode is not very popular as mainly communications require the two-way exchange of data. The simplex
mode is used in the business field as in sales that do not require any corresponding reply.
ā€¢The radio station is a simplex channel as it transmits the signal to the listeners but never allows them to transmit back.
ā€¢Keyboard and Monitor are the examples of the simplex mode as a keyboard can only accept the data from the user and
monitor can only be used to display the data on the screen.
ā€¢The main advantage of the simplex mode is that the full capacity of the communication channel can be utilized during
transmission.
Advantage of Simplex mode:
ā€¢In simplex mode, the station can utilize the entire bandwidth of the communication channel, so that more data can be
transmitted at a time.
Disadvantage of Simplex mode:
ā€¢Communication is unidirectional, so it has no inter-communication between devices.
ā€¢ Half-Duplex mode Contdā€¦.
ā€¢In a Half-duplex channel, direction can be reversed, i.e., the station can transmit and receive the data as well.
ā€¢Messages flow in both the directions, but not at the same time.
ā€¢The entire bandwidth of the communication channel is utilized in one direction at a time.
ā€¢In half-duplex mode, it is possible to perform the error detection, and if any error occurs, then the receiver requests the
sender to retransmit the data.
ā€¢A Walkie-talkie is an example of the Half-duplex mode. In Walkie-talkie, one party speaks, and another party listens. After
a pause, the other speaks and first party listens. Speaking simultaneously will create the distorted sound which cannot be
understood.
Advantage of Half-duplex mode:
ā€¢In half-duplex mode, both the devices can send and receive the data and also can utilize the entire bandwidth of the
communication channel during the transmission of data.
Disadvantage of Half-Duplex mode:
ā€¢In half-duplex mode, when one device is sending the data, then another has to wait, this causes the delay in sending the data
at the right time.
ā€¢ Full-duplex mode
Contdā€¦.
ā€¢In Full duplex mode, the communication is bi-directional, i.e., the data flow in both the directions.
ā€¢Both the stations can send and receive the message simultaneously.
ā€¢Full-duplex mode has two simplex channels. One channel has traffic moving in one direction, and another channel has
traffic flowing in the opposite direction.
ā€¢The Full-duplex mode is the fastest mode of communication between devices.
ā€¢The most common example of the full-duplex mode is a telephone network. When two people are communicating with each
other by a telephone line, both can talk and listen at the same time.
Advantage of Full-duplex mode:
ā€¢Both the stations can send and receive the data at the same time.
Disadvantage of Full-duplex mode:
ā€¢If there is no dedicated path exists between the devices, then the capacity of the communication channel is divided into two
parts.
Differences b/w Simplex, Half-duplex and Full-duplex mode
Basis for
comparison
Simplex mode Half-duplex mode Full-duplex mode
Direction of
communication
In simplex mode, the
communication is unidirectional.
In half-duplex mode, the communication is
bidirectional, but one at a time.
In full-duplex mode, the
communication is bidirectional.
Send/Receive A device can only send the data
but cannot receive it or it can
only receive the data but cannot
send it.
Both the devices can send and receive the
data, but one at a time.
Both the devices can send and
receive the data simultaneously.
Performance The performance of half-duplex
mode is better than the simplex
mode.
The performance of full-duplex mode is better
than the half-duplex mode.
The Full-duplex mode has better
performance among simplex and
half-duplex mode as it doubles
the utilization of the capacity of
the communication channel.
Example Examples of Simplex mode are
radio, keyboard, and monitor.
Example of half-duplex is Walkie-Talkies. Example of the Full-duplex mode
is a telephone network.
Netiquette
ā€¢ Netiquette is a made-up word from the words net and etiquette.
ā€¢ Netiquette thus describes the rules of conduct for respectful and appropriate
communication on the internet.
ā€¢ Netiquette is often referred to as etiquette for the internet.
ā€¢ These are not legally binding rules, but recommended rules of etiquette.
ā€¢ Netiquette is mostly used for dealing with unknown people on the internet.
ā€¢ The rules of netiquette very depending on the platform and its participants .
ā€¢ Generally, it is up to the operator of a website or communication app to specify the type and
scope of netiquette.
ā€¢ It is also their responsibility to monitor compliance with these basic rules and to penalize
violations of them.
Netiquette: General rules of conduct
ā€¢ Stick to the rules of conduct online that you follow in real life
ā€¢ Netiquette: Think of the person
ā€¢ Present your best side online
ā€¢ Read first, then ask
ā€¢ Pay attention to grammar and punctuation
ā€¢ Respect the privacy of others
ā€¢ Respect the time and bandwidth of others
ā€¢ Forgive the mistakes of others
ā€¢ Don't abuse your power
ā€¢ Help keep flame wars under control
ā€¢ Know where you are in cyberspace
ā€¢ Hate speech and netiquette
Unit 1 Information Technology for studentšŸ‘©ā€šŸŽ“.pdf

More Related Content

Similar to Unit 1 Information Technology for studentšŸ‘©ā€šŸŽ“.pdf

Introduction of network
Introduction of networkIntroduction of network
Introduction of network
sharone singh
Ā 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptx
AASTHAJAJOO
Ā 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
SOLOMONCHINAEMEUCHEA
Ā 
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
SuratSingh18
Ā 
Dc lec-03 (topologies)
Dc lec-03  (topologies)Dc lec-03  (topologies)
Dc lec-03 (topologies)
diaryinc
Ā 
Computer Network
Computer NetworkComputer Network
Computer Network
Subhash Vadadoriya
Ā 
Network topologies
Network topologiesNetwork topologies
Network topologies
Norah Saad
Ā 
Topology
TopologyTopology
Topology
MdAnikKhan
Ā 
Lecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.pptLecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.ppt
flyinimohamed
Ā 
Unit_1.pptx
Unit_1.pptxUnit_1.pptx
Unit_1.pptx
Mayura shelke
Ā 
Network topology
Network topologyNetwork topology
Network topology
GayatriSonawane2
Ā 
NETWORK TOPOLOGY
NETWORK TOPOLOGYNETWORK TOPOLOGY
NETWORK TOPOLOGY
wahab2433
Ā 
1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf
sophia763824
Ā 
1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf
JamesOtieno34
Ā 
Network topology
Network topologyNetwork topology
Network topology
GayatriSonawane2
Ā 
Networks PPT
Networks PPTNetworks PPT
Networks PPT
Singh Bedi
Ā 
Introduction to data communications
Introduction to data communicationsIntroduction to data communications
Introduction to data communications
ArunaSekar1
Ā 
Topology.pptx
Topology.pptxTopology.pptx
Topology.pptx
DanielGuballo
Ā 
Data communication and computer networks
Data communication and computer networksData communication and computer networks
Data communication and computer networks
marwa_ma
Ā 
Mithun Network topology .pptx
Mithun Network topology .pptxMithun Network topology .pptx
Mithun Network topology .pptx
Mithun838675
Ā 

Similar to Unit 1 Information Technology for studentšŸ‘©ā€šŸŽ“.pdf (20)

Introduction of network
Introduction of networkIntroduction of network
Introduction of network
Ā 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptx
Ā 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
Ā 
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
Ā 
Dc lec-03 (topologies)
Dc lec-03  (topologies)Dc lec-03  (topologies)
Dc lec-03 (topologies)
Ā 
Computer Network
Computer NetworkComputer Network
Computer Network
Ā 
Network topologies
Network topologiesNetwork topologies
Network topologies
Ā 
Topology
TopologyTopology
Topology
Ā 
Lecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.pptLecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.ppt
Ā 
Unit_1.pptx
Unit_1.pptxUnit_1.pptx
Unit_1.pptx
Ā 
Network topology
Network topologyNetwork topology
Network topology
Ā 
NETWORK TOPOLOGY
NETWORK TOPOLOGYNETWORK TOPOLOGY
NETWORK TOPOLOGY
Ā 
1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf
Ā 
1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf
Ā 
Network topology
Network topologyNetwork topology
Network topology
Ā 
Networks PPT
Networks PPTNetworks PPT
Networks PPT
Ā 
Introduction to data communications
Introduction to data communicationsIntroduction to data communications
Introduction to data communications
Ā 
Topology.pptx
Topology.pptxTopology.pptx
Topology.pptx
Ā 
Data communication and computer networks
Data communication and computer networksData communication and computer networks
Data communication and computer networks
Ā 
Mithun Network topology .pptx
Mithun Network topology .pptxMithun Network topology .pptx
Mithun Network topology .pptx
Ā 

Recently uploaded

Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
Ā 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
Ā 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
Ā 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
Ā 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
Ā 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
Ā 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
Ā 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
Ā 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
Ā 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
Ā 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
Ā 
GIƁO ƁN Dįŗ Y THƊM (Kįŗ¾ HOįŗ CH BƀI BUį»”I 2) - TIįŗ¾NG ANH 8 GLOBAL SUCCESS (2 Cį»˜T) N...
GIƁO ƁN Dįŗ Y THƊM (Kįŗ¾ HOįŗ CH BƀI BUį»”I 2) - TIįŗ¾NG ANH 8 GLOBAL SUCCESS (2 Cį»˜T) N...GIƁO ƁN Dįŗ Y THƊM (Kįŗ¾ HOįŗ CH BƀI BUį»”I 2) - TIįŗ¾NG ANH 8 GLOBAL SUCCESS (2 Cį»˜T) N...
GIƁO ƁN Dįŗ Y THƊM (Kįŗ¾ HOįŗ CH BƀI BUį»”I 2) - TIįŗ¾NG ANH 8 GLOBAL SUCCESS (2 Cį»˜T) N...
Nguyen Thanh Tu Collection
Ā 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
Ā 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
Ā 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
Ā 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
Ā 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
Ā 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
Ā 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
Ā 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
Ā 

Recently uploaded (20)

Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
Ā 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
Ā 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
Ā 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Ā 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
Ā 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
Ā 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Ā 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Ā 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Ā 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Ā 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Ā 
GIƁO ƁN Dįŗ Y THƊM (Kįŗ¾ HOįŗ CH BƀI BUį»”I 2) - TIįŗ¾NG ANH 8 GLOBAL SUCCESS (2 Cį»˜T) N...
GIƁO ƁN Dįŗ Y THƊM (Kįŗ¾ HOįŗ CH BƀI BUį»”I 2) - TIįŗ¾NG ANH 8 GLOBAL SUCCESS (2 Cį»˜T) N...GIƁO ƁN Dįŗ Y THƊM (Kįŗ¾ HOįŗ CH BƀI BUį»”I 2) - TIįŗ¾NG ANH 8 GLOBAL SUCCESS (2 Cį»˜T) N...
GIƁO ƁN Dįŗ Y THƊM (Kįŗ¾ HOįŗ CH BƀI BUį»”I 2) - TIįŗ¾NG ANH 8 GLOBAL SUCCESS (2 Cį»˜T) N...
Ā 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
Ā 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Ā 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Ā 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Ā 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
Ā 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Ā 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Ā 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Ā 

Unit 1 Information Technology for studentšŸ‘©ā€šŸŽ“.pdf

  • 1. Unit 1 : Information Technology Dr.Durga wati Kushwaha Assistant Professor
  • 2. Network Topology ā€¢ Network topology is the arrangement of the elements (links, nodes, etc.) of a communication network. ā€¢ Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial field busses and computer networks. ā€¢ Network topology is the topologicalstructure of a network and may be depicted physically or logically. ā€¢ It is an application of graph theory wherein communicating devices are modeled as nodes and the connections between the devices are modeled as links or lines between the nodes. ā€¢ Physical topology is the placement of the various components of a network (e.g., device location and cable installation), while logical topology illustrates how data flows within a network. ā€¢ Examples of network topologies are found in local area networks (LAN), a common computer network installation.
  • 3. Topologies ā€¢ Physical topology : ļƒ¼The transmission medium layout used to link devices is the physical topology of the network. For conductive or fiber optical mediums, this refers to the layout of cabling, the locations of nodes, and the links between the nodes and the cabling. ļƒ¼ The physical topology of a network is determined by the capabilities of the network access devices and media, the level of control or fault tolerance desired, and the cost associated with cabling or telecommunication circuits. ā€¢ Logical topology : ā€¢ Logical topology is the way that the signals act on the network media, or the way that the data passes through the network from one device to the next without regard to the physical interconnection of the devices. ā€¢ A network's logical topology is not necessarily the same as its physical topology.
  • 4. Types of Network Topology
  • 5. Contdā€¦. Bus topology ā€¢ The bus topology is designed in such a way that all the stations are connected through a single cable known as a backbone cable. ā€¢ Each node is either connected to the backbone cable by drop cable or directly connected to the backbone cable. ā€¢ When a node wants to send a message over the network, it puts a message over the network. All the stations available in the network will receive the message whether it has been addressed or not. ā€¢ The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks. ā€¢ The configuration of a bus topology is quite simpler as compared to other topologies. ā€¢ The backbone cable is considered as a "single lane" through which the message is broadcast to all the stations. ā€¢ The most common access method of the bus topologies is CSMA (Carrier Sense Multiple Access). CSMA: It is a media access control used to control the data flow so that data integrity is maintained, i.e., the packets do not get lost. There are two alternative ways of handling the problems that occur when two nodes send the messages simultaneously. ā€¢CSMA CD: CSMA CD (Collision detection) is an access method used to detect the collision. Once the collision is detected, the sender will stop transmitting the data. Therefore, it works on "recovery after the collision". ā€¢CSMA CA: CSMA CA (Collision Avoidance) is an access method used to avoid the collision by checking whether the transmission media is busy or not. If busy, then the sender waits until the media becomes idle. This technique effectively reduces the possibility of the collision. It does not work on "recovery after the collision".
  • 6. Contdā€¦. Advantages ā€¢ Low-cost cable ā€¢ Moderate data speeds ā€¢ Familiar technology ā€¢ Limited failure Disadvantages ā€¢ Extensive cabling ā€¢ Difficult troubleshooting ā€¢ Signal interference ā€¢ Reconfiguration difficult ā€¢ Attenuation (loss of signal leads to communication issues. Repeaters are used to regenerate the signal.)
  • 7. ā€¢ Ring Topology: ļƒ¼Ring topology is like a bus topology, but with connected ends. ļƒ¼The node that receives the message from the previous computer will retransmit to the next node. ļƒ¼The data flows in one direction, i.e., it is unidirectional. ļƒ¼The data flows in a single loop continuously known as an endless loop. ļƒ¼It has no terminated ends, i.e., each node is connected to other node and having no termination point. ļƒ¼The data in a ring topology flow in a clockwise direction. ļƒ¼The most common access method of the ring topology is token passing. ā€¢ Token passing: It is a network access method in which token is passed from one node to another node. ā€¢ Token: It is a frame that circulates around the network. Working of Token passing ā€¢ A token moves around the network, and it is passed from computer to computer until it reaches the destination. ā€¢ The sender modifies the token by putting the address along with the data. ā€¢ The data is passed from one device to another device until the destination address matches. ā€¢ Once the token received by the destination device, then it sends the acknowledgment to the sender. ā€¢ In a ring topology, a token is used as a carrier. Contdā€¦.
  • 8. Contdā€¦. Advantages ā€¢ Network Management ā€¢ Product availability ā€¢ Cost ā€¢ Reliable Disadvantages ā€¢ Difficult troubleshooting ā€¢ Failure ā€¢ Reconfiguration difficult ā€¢ Delay
  • 9. ā€¢ Star Topology Contdā€¦. ā€¢Star topology is an arrangement of the network in which every node is connected to the central hub, switch or a central computer. ā€¢The central computer is known as a server, and the peripheral devices attached to the server are known as clients. ā€¢Coaxial cable or RJ-45 cables are used to connect the computers. ā€¢Hubs or Switches are mainly used as connection devices in a physical star topology. ā€¢Star topology is the most popular topology in network implementation.
  • 10. Contdā€¦. Advantages ā€¢ Efficient troubleshooting ā€¢ Network control ā€¢ Limited failure ā€¢ Familiar technology ā€¢ Easily expandable ā€¢ Cost effective ā€¢ High data speeds Disadvantages ā€¢ A Central point of failure ā€¢ Cable
  • 11. ā€¢ Tree topology: ļƒ¼Combines the characteristics of bus topology and star topology. ļƒ¼A tree topology is a type of structure in which all the computers are connected with each other in hierarchical fashion. ļƒ¼The top-most node in tree topology is known as a root node, and all other nodes are the descendants of the root node. ļƒ¼There is only one path exists between two nodes for the data transmission. Thus, it forms a parent-child hierarchy. Contdā€¦. Advantages Disadvantages Support for broadband transmission Difficult troubleshooting Easily expandable & manageable High cost Error detection Failure Limited failure Reconfiguration difficult Point-to-point wiring
  • 12. ā€¢ Mesh topology ļƒ¼Mesh technology is an arrangement of the network in which computers are interconnected with each other through various redundant connections. ļƒ¼There are multiple paths from one computer to another computer. ļƒ¼It does not contain the switch, hub or any central computer which acts as a central point of communication. ļƒ¼The Internet is an example of the mesh topology. ļƒ¼Mesh topology is mainly used for WAN implementations where communication failures are a critical concern. ļƒ¼Mesh topology is mainly used for wireless networks. ļƒ¼Mesh topology can be formed by using the formula: Number of cables = (n*(n-1))/2; Where n is the number of nodes that represents the network. Contdā€¦.
  • 13. ā€¢ Mesh topology is divided into two categories: ļƒ¼Fully connected mesh topology ļƒ¼Partially connected mesh topology Contdā€¦. ā€¢Full Mesh Topology: In a full mesh topology, each computer is connected to all the computers available in the network. ā€¢Partial Mesh Topology: In a partial mesh topology, not all but certain computers are connected to those computers with which they communicate frequently. Advantages Disadvantages Reliable Cost Fast Communication Management is difficult Easier Reconfiguration Efficiency( redundant connections are high that reduces the efficiency of the network)
  • 14. ā€¢ Hybrid Topology Contdā€¦. ā€¢The combination of various different topologies is known as Hybrid topology. ā€¢A Hybrid topology is a connection between different links and nodes to transfer the data. ā€¢When two or more different topologies are combined together is termed as Hybrid topology and if similar topologies are connected with each other will not result in Hybrid topology. ā€¢For example, if there exist a ring topology in one branch of ICICI bank and bus topology in another branch of ICICI bank, connecting these two topologies will result in Hybrid topology. Advantages Disadvantages Reliable Complex design Scalable Costly Hub Flexible Costly infrastructure Effective
  • 15. Transmission modes ā€¢The way in which data is transmitted from one device to another device is known as transmission mode. ā€¢The transmission mode is also known as the communication mode. ā€¢Each communication channel has a direction associated with it, and transmission media provide the direction. Therefore, the transmission mode is also known as a directional mode. ā€¢The transmission mode is defined in the physical layer. ā€¢The Transmission mode is divided into three categories: ļƒ˜ Simplex mode ļƒ˜ Half-duplex mode ļƒ˜ Full-duplex mode
  • 16. ā€¢ Simplex mode Contdā€¦. ā€¢In Simplex mode, the communication is unidirectional, i.e., the data flow in one direction. ā€¢A device can only send the data but cannot receive it or it can receive the data but cannot send the data. ā€¢This transmission mode is not very popular as mainly communications require the two-way exchange of data. The simplex mode is used in the business field as in sales that do not require any corresponding reply. ā€¢The radio station is a simplex channel as it transmits the signal to the listeners but never allows them to transmit back. ā€¢Keyboard and Monitor are the examples of the simplex mode as a keyboard can only accept the data from the user and monitor can only be used to display the data on the screen. ā€¢The main advantage of the simplex mode is that the full capacity of the communication channel can be utilized during transmission. Advantage of Simplex mode: ā€¢In simplex mode, the station can utilize the entire bandwidth of the communication channel, so that more data can be transmitted at a time. Disadvantage of Simplex mode: ā€¢Communication is unidirectional, so it has no inter-communication between devices.
  • 17. ā€¢ Half-Duplex mode Contdā€¦. ā€¢In a Half-duplex channel, direction can be reversed, i.e., the station can transmit and receive the data as well. ā€¢Messages flow in both the directions, but not at the same time. ā€¢The entire bandwidth of the communication channel is utilized in one direction at a time. ā€¢In half-duplex mode, it is possible to perform the error detection, and if any error occurs, then the receiver requests the sender to retransmit the data. ā€¢A Walkie-talkie is an example of the Half-duplex mode. In Walkie-talkie, one party speaks, and another party listens. After a pause, the other speaks and first party listens. Speaking simultaneously will create the distorted sound which cannot be understood. Advantage of Half-duplex mode: ā€¢In half-duplex mode, both the devices can send and receive the data and also can utilize the entire bandwidth of the communication channel during the transmission of data. Disadvantage of Half-Duplex mode: ā€¢In half-duplex mode, when one device is sending the data, then another has to wait, this causes the delay in sending the data at the right time.
  • 18. ā€¢ Full-duplex mode Contdā€¦. ā€¢In Full duplex mode, the communication is bi-directional, i.e., the data flow in both the directions. ā€¢Both the stations can send and receive the message simultaneously. ā€¢Full-duplex mode has two simplex channels. One channel has traffic moving in one direction, and another channel has traffic flowing in the opposite direction. ā€¢The Full-duplex mode is the fastest mode of communication between devices. ā€¢The most common example of the full-duplex mode is a telephone network. When two people are communicating with each other by a telephone line, both can talk and listen at the same time. Advantage of Full-duplex mode: ā€¢Both the stations can send and receive the data at the same time. Disadvantage of Full-duplex mode: ā€¢If there is no dedicated path exists between the devices, then the capacity of the communication channel is divided into two parts.
  • 19. Differences b/w Simplex, Half-duplex and Full-duplex mode Basis for comparison Simplex mode Half-duplex mode Full-duplex mode Direction of communication In simplex mode, the communication is unidirectional. In half-duplex mode, the communication is bidirectional, but one at a time. In full-duplex mode, the communication is bidirectional. Send/Receive A device can only send the data but cannot receive it or it can only receive the data but cannot send it. Both the devices can send and receive the data, but one at a time. Both the devices can send and receive the data simultaneously. Performance The performance of half-duplex mode is better than the simplex mode. The performance of full-duplex mode is better than the half-duplex mode. The Full-duplex mode has better performance among simplex and half-duplex mode as it doubles the utilization of the capacity of the communication channel. Example Examples of Simplex mode are radio, keyboard, and monitor. Example of half-duplex is Walkie-Talkies. Example of the Full-duplex mode is a telephone network.
  • 20. Netiquette ā€¢ Netiquette is a made-up word from the words net and etiquette. ā€¢ Netiquette thus describes the rules of conduct for respectful and appropriate communication on the internet. ā€¢ Netiquette is often referred to as etiquette for the internet. ā€¢ These are not legally binding rules, but recommended rules of etiquette. ā€¢ Netiquette is mostly used for dealing with unknown people on the internet. ā€¢ The rules of netiquette very depending on the platform and its participants . ā€¢ Generally, it is up to the operator of a website or communication app to specify the type and scope of netiquette. ā€¢ It is also their responsibility to monitor compliance with these basic rules and to penalize violations of them.
  • 21. Netiquette: General rules of conduct ā€¢ Stick to the rules of conduct online that you follow in real life ā€¢ Netiquette: Think of the person ā€¢ Present your best side online ā€¢ Read first, then ask ā€¢ Pay attention to grammar and punctuation ā€¢ Respect the privacy of others ā€¢ Respect the time and bandwidth of others ā€¢ Forgive the mistakes of others ā€¢ Don't abuse your power ā€¢ Help keep flame wars under control ā€¢ Know where you are in cyberspace ā€¢ Hate speech and netiquette