SlideShare a Scribd company logo
1 of 27
1
Introduction
2
Intro
 A network is a group of computers that are
connected to share hardware and software.
 The group can be as small and simple as two
computers and a printer set up in a house or as
large and complex as thousands of computers
and hundreds of printers and other devices.
 In order for the computers to communicate with
each other, they must share three elements: a
network media and topology, a protocol, and
a software client or service.
3
The Functions of a Network
 If the purpose of a network is to share resources
among computer systems, what types of
information and services are shared on a
network and why?
 Communication - videoconferencing, real-time chats,
email.
 Sharing hardware – printer, scanners, CD-ROM
drives, tape drives
 Data sharing – security is a major task
 Application sharing - application can be run from a
central location.
 Data backup and retrieval – managed central
backup
4
Peer-to-Peer Versus Client/Server
 Peer-to-Peer
 also known as a workgroup, is a low-cost, easily
implemented network solution
 generally used in small network environments that
need to share a few files and may be some hardware,
such as printers.
 all systems are equal, or peers. Each system can
share hardware or files and access the same things
on other systems.
 is often referred to as decentralized networking
because the network files, data, and administration
are not handled from a central location.
5
6
Pros and Cons
 Advantages of Peer-to-Peer Networks
 Cost - Because peer-to-peer networking does not
require a dedicated server, such networks are very
cost-effective.
 Ease of installation
 Disadvantages of Peer-to-Peer Networks
 Security - security needs to be applied to each
computer and resource individually.
 Data backup - each system must have its data
backed up individually.
 Resource access - difficult to locate resources on the
network.
 Limited numbers of computers - Peer-to-peer
networking is effective only on small networks (fewer
than 10 computers).
7
Client/Server Networking Model
 Scalable, allowing additional computers or
other networked devices to be added with
little difficulty.
 Centralized management of all network
services, security, and streamlined backup
procedures.
 two different types of computers are
required: the client and the server.
8
9
Servers
 workhorses of the network.
 require additional resources and computing
power.
 servers also require a network operating system.
 Microsoft Windows 2000/2003, Unix, Mac OS X
servers, and Novell NetWare.
 network may have a single server that offers
more than one network service or hundreds of
servers, each performing a dedicated task.
10
Client Computers
 connect to the network and access the
resources of the server.
 Software is needed to allow the client to
connect to the network, which is mostly
now built in to desktop operating systems.
11
Pros and Cons
 Advantages of Client/Server Networking
 Centralized management and security
 Scalability
 Simplified backups
 Disadvantages of Client/Server Networking
 High cost - additional hardware and software costs
 Administration requirements - needs technically
skilled people to manage and maintain the network
and the servers.
 Single points of failure - If the server fails, the clients
can't access the services that reside on the server.
Great effort and expense are needed to ensure the
high availability of network servers.
12
Distributed and Centralized
Computing
 The terms distributed and centralized computing
describe the location on a network where the
processing takes place.
 In an environment such as a mainframe, the
processing is performed on a centralized system
that also stores all the data. In such a model, no
data processing or data storage occurs on the
client terminal.
 In contrast, in a distributed processing
environment, processing is performed in more
than one place. If a network has servers and
workstations, processing can take place on the
server or on the client.
13
Topology
 Basically, a topology is a shape, so a network
topology is the shape of a network.
 There is, however, a big difference between a
physical network topology and a logical network
topology. The physical network topology
represents how the network looks to the naked
eye—in other words, the way the components
are arranged.
 The logical network topology represents how the
flow of information works its way through the
network.
14
Bus
 The bus topology was commonly used in
earlier networks but is not seen much
today. In a bus topology, a single cable
connects all the computers.
 A coaxial cable is used with special
connectors called BNC and T connectors.
 The bus only works if both ends of the
cable have a special resistor installed
called a terminator.
15
16
Pros and Cons
 Pros
 The bus topology is very simple and inexpensive to
implement due to its low cost requirements for cable
installation (there's only one main trunk).
 Cons
 Without the proper terminations in place, expect a
very slow or inoperable network.
 The cable itself is a single point of failure. One break,
cut, or poor connection negatively impacts the entire
LAN.
 Because all workstations or devices share a common
cable, troubleshooting can be difficult when problems
occur. You must disrupt LAN service for
troubleshooting.
17
Star
 A star topology is a group of computers that are
connected to a central location such as a hub or a
switch.
 This is the most common topology in use today.
 The computers may be physically located next to
each other or spread throughout an entire building,
but the flow of information from each computer to
the other computers must go through the central
location.
 Since each computer has its own connection, the
failure of one computer will not affect the other
computers in the network; however, if the hub or
switch should fail, then all of the computers on that
hub or switch will be affected.
18
19
Pros and Cons
 Advantages
 Management of the network is centralized around the
hub and switch components.
 Wiring installation is less obtrusive and therefore does
not disrupt LAN service with the addition or deletion of
nodes.
 A cable cut or bad connector does not take down the
entire LAN segment.
 Disadvantage
 The network component (hub or switch) is a single
point of failure, and
 a great deal of wiring is involved to implement the
star.
20
21
Ring Topology
 Ring topologies are more complex than the bus
and star topologies, but they offer some
attractive features.
 Nodes logically communicate in a ring formation,
with each node communicating only directly with
its upstream and downstream neighbors.
 You can probably picture what a mess the wiring
would be in an office with hundreds of computer
systems, if a network like this were implemented
as a physical ring. So ring topologies are
typically implemented in a physical star topology.
22
Pros and Cons
 Pros
 Token-controlled access provides greater overall
bandwidth use.
 Data packet transmission happens within a
determinable time interval. This quality of ring
topologies has made it a staple in situations in which
timing is essential.
 Because each node knows its upstream and
downstream neighbors, this information can be used to
determine where problems have occurred on the ring.
 Cons
 The firmware required to manage the ring is somewhat
complicated and must be on every network card that
participates in the ring which makes Token-Ring
network adapters more expensive devices.
23
Mesh Topology
 A mesh topology is an interlacing of multiple
connections among several nodes. Typically, a
mesh is done for one purpose: redundancy.
 There are two types of mesh: full and partial.
 Except in the smallest network, a full mesh is not
very practical due to high cost.
 Full mesh means that every node contained in a
network has a connection to every other node
contained in the network.
 Partial meshes are designed to provide
redundancy where it is needed.
24
Hybrid Topologies
 Three popular hybrids
are tree, hierarchical
star, and star-wireless.
 The figure below shows
a tree hybrid
combination that groups
workstations in a star
and joins the stars
along a linear bus. The
majority of the problems
of the bus are
eliminated because a
single workstation
cannot bring the entire
LAN to a halt.
25
Hierarchical Star
 Another method that can be used to connect hubs is a
hierarchical star. This method uses a central hub to link
several hubs that have workstations attached.
 This method can be used to build very large LANs;
however, there are restrictions on the size of the LAN.
26
Star-Wireless
 The most recent hybrid topology has arrived with the advent of
wireless technology.
 Wireless LAN technology in its current implementation requires a
user to be in the vicinity of an access point attached to the wired
data network. A configuration such as this gives you an amorphous
hybrid topology of star combined with wireless.
27
Fill the following chart

More Related Content

Similar to 01 - Topology.ppt

Computer networks--introduction computer-networking
Computer networks--introduction computer-networkingComputer networks--introduction computer-networking
Computer networks--introduction computer-networking
Mustapher Matias
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKING
bwire sedrick
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
Besar Limani
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
shiv balapure
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
martuj
 

Similar to 01 - Topology.ppt (20)

NETWORKING
NETWORKINGNETWORKING
NETWORKING
 
Network and Types of Networks
Network and Types of NetworksNetwork and Types of Networks
Network and Types of Networks
 
Unit 2B.pdf
Unit 2B.pdfUnit 2B.pdf
Unit 2B.pdf
 
fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)
 
Computer networks--introduction computer-networking
Computer networks--introduction computer-networkingComputer networks--introduction computer-networking
Computer networks--introduction computer-networking
 
Computer Networking 2
Computer Networking 2Computer Networking 2
Computer Networking 2
 
Network and Communication
Network and CommunicationNetwork and Communication
Network and Communication
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKING
 
Types of communication networks
Types of communication networksTypes of communication networks
Types of communication networks
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPAL
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPALComputer Network By Pawan Thakur HOD CS & IT VIM BHOPAL
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPAL
 
Grade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptxGrade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptx
 
Ccna(routing &and switching)
Ccna(routing &and switching)Ccna(routing &and switching)
Ccna(routing &and switching)
 
Cf presentation by muhammad saad salman
Cf presentation by muhammad saad salmanCf presentation by muhammad saad salman
Cf presentation by muhammad saad salman
 
1. Ch # 02 1st year computer science notes
1. Ch # 02 1st year computer science notes1. Ch # 02 1st year computer science notes
1. Ch # 02 1st year computer science notes
 
Kinds of networks
Kinds of networksKinds of networks
Kinds of networks
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 

More from ssuserf7cd2b

The Oxford Dictionary of English Grammar ( PDFDrive ).pdf
The Oxford Dictionary of English Grammar ( PDFDrive ).pdfThe Oxford Dictionary of English Grammar ( PDFDrive ).pdf
The Oxford Dictionary of English Grammar ( PDFDrive ).pdf
ssuserf7cd2b
 
Attachment_0 (2).pdf
Attachment_0 (2).pdfAttachment_0 (2).pdf
Attachment_0 (2).pdf
ssuserf7cd2b
 
The Oxford Dictionary of English Grammar ( PDFDrive ) (1).pdf
The Oxford Dictionary of English Grammar ( PDFDrive ) (1).pdfThe Oxford Dictionary of English Grammar ( PDFDrive ) (1).pdf
The Oxford Dictionary of English Grammar ( PDFDrive ) (1).pdf
ssuserf7cd2b
 
AdvancedSkillsforComm.-BookI.doc
AdvancedSkillsforComm.-BookI.docAdvancedSkillsforComm.-BookI.doc
AdvancedSkillsforComm.-BookI.doc
ssuserf7cd2b
 
Noor-Book.com دليلك الكامل لمهارات الإتصال بالانجليزية.pdf
Noor-Book.com  دليلك الكامل لمهارات الإتصال بالانجليزية.pdfNoor-Book.com  دليلك الكامل لمهارات الإتصال بالانجليزية.pdf
Noor-Book.com دليلك الكامل لمهارات الإتصال بالانجليزية.pdf
ssuserf7cd2b
 
4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf
4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf
4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf
ssuserf7cd2b
 
NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...
NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...
NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...
ssuserf7cd2b
 
Protocol_specification_testing_and_verif.pdf
Protocol_specification_testing_and_verif.pdfProtocol_specification_testing_and_verif.pdf
Protocol_specification_testing_and_verif.pdf
ssuserf7cd2b
 

More from ssuserf7cd2b (20)

English Communication (AEC-01).pdf
English Communication (AEC-01).pdfEnglish Communication (AEC-01).pdf
English Communication (AEC-01).pdf
 
The Oxford Dictionary of English Grammar ( PDFDrive ).pdf
The Oxford Dictionary of English Grammar ( PDFDrive ).pdfThe Oxford Dictionary of English Grammar ( PDFDrive ).pdf
The Oxford Dictionary of English Grammar ( PDFDrive ).pdf
 
Attachment_0 (2).pdf
Attachment_0 (2).pdfAttachment_0 (2).pdf
Attachment_0 (2).pdf
 
Attachment_0.pdf
Attachment_0.pdfAttachment_0.pdf
Attachment_0.pdf
 
Attachment_0 (1).pdf
Attachment_0 (1).pdfAttachment_0 (1).pdf
Attachment_0 (1).pdf
 
The Oxford Dictionary of English Grammar ( PDFDrive ) (1).pdf
The Oxford Dictionary of English Grammar ( PDFDrive ) (1).pdfThe Oxford Dictionary of English Grammar ( PDFDrive ) (1).pdf
The Oxford Dictionary of English Grammar ( PDFDrive ) (1).pdf
 
AdvancedSkillsforComm.-BookI.doc
AdvancedSkillsforComm.-BookI.docAdvancedSkillsforComm.-BookI.doc
AdvancedSkillsforComm.-BookI.doc
 
VA118-15-N-0042-001.docx
VA118-15-N-0042-001.docxVA118-15-N-0042-001.docx
VA118-15-N-0042-001.docx
 
Noor-Book.com دليلك الكامل لمهارات الإتصال بالانجليزية.pdf
Noor-Book.com  دليلك الكامل لمهارات الإتصال بالانجليزية.pdfNoor-Book.com  دليلك الكامل لمهارات الإتصال بالانجليزية.pdf
Noor-Book.com دليلك الكامل لمهارات الإتصال بالانجليزية.pdf
 
4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf
4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf
4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf
 
Applications.docx
Applications.docxApplications.docx
Applications.docx
 
Chapter-04.pdf
Chapter-04.pdfChapter-04.pdf
Chapter-04.pdf
 
Chapter 2.pdf
Chapter 2.pdfChapter 2.pdf
Chapter 2.pdf
 
StandardIPinSpace.pdf
StandardIPinSpace.pdfStandardIPinSpace.pdf
StandardIPinSpace.pdf
 
04 - Networking Technologies.ppt
04 - Networking Technologies.ppt04 - Networking Technologies.ppt
04 - Networking Technologies.ppt
 
NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...
NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...
NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...
 
Chapter-3.pdf
Chapter-3.pdfChapter-3.pdf
Chapter-3.pdf
 
Protocol_specification_testing_and_verif.pdf
Protocol_specification_testing_and_verif.pdfProtocol_specification_testing_and_verif.pdf
Protocol_specification_testing_and_verif.pdf
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
 
03 - Cabling Standards, Media, and Connectors.ppt
03 - Cabling Standards, Media, and Connectors.ppt03 - Cabling Standards, Media, and Connectors.ppt
03 - Cabling Standards, Media, and Connectors.ppt
 

Recently uploaded

Design-System - FinTech - Isadora Agency
Design-System - FinTech - Isadora AgencyDesign-System - FinTech - Isadora Agency
Design-System - FinTech - Isadora Agency
Isadora Agency
 
Resume all my skills and educations and achievement
Resume all my skills and educations and  achievement Resume all my skills and educations and  achievement
Resume all my skills and educations and achievement
210303105569
 
Jual Obat Aborsi Semarang ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Semarang ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Semarang ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Semarang ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
In Saudi Arabia Jeddah (+918761049707)) Buy Abortion Pills For Sale in Riyadh
In Saudi Arabia Jeddah (+918761049707)) Buy Abortion Pills For Sale in RiyadhIn Saudi Arabia Jeddah (+918761049707)) Buy Abortion Pills For Sale in Riyadh
In Saudi Arabia Jeddah (+918761049707)) Buy Abortion Pills For Sale in Riyadh
ahmedjiabur940
 
一比一原版(ANU毕业证书)澳大利亚国立大学毕业证原件一模一样
一比一原版(ANU毕业证书)澳大利亚国立大学毕业证原件一模一样一比一原版(ANU毕业证书)澳大利亚国立大学毕业证原件一模一样
一比一原版(ANU毕业证书)澳大利亚国立大学毕业证原件一模一样
yhavx
 
一比一定(购)滑铁卢大学毕业证(UW毕业证)成绩单学位证
一比一定(购)滑铁卢大学毕业证(UW毕业证)成绩单学位证一比一定(购)滑铁卢大学毕业证(UW毕业证)成绩单学位证
一比一定(购)滑铁卢大学毕业证(UW毕业证)成绩单学位证
wpkuukw
 
如何办理(Columbia College毕业证书)纽约市哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(Columbia College毕业证书)纽约市哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(Columbia College毕业证书)纽约市哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(Columbia College毕业证书)纽约市哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
ugzga
 
422368378-Laos-Architecture.pdfmmmmkkkkmmm
422368378-Laos-Architecture.pdfmmmmkkkkmmm422368378-Laos-Architecture.pdfmmmmkkkkmmm
422368378-Laos-Architecture.pdfmmmmkkkkmmm
KarenNares2
 
一比一原版澳洲堪培拉大学毕业证(UC毕业证书)毕业证成绩单留信认证
一比一原版澳洲堪培拉大学毕业证(UC毕业证书)毕业证成绩单留信认证一比一原版澳洲堪培拉大学毕业证(UC毕业证书)毕业证成绩单留信认证
一比一原版澳洲堪培拉大学毕业证(UC毕业证书)毕业证成绩单留信认证
khuurq8kz
 

Recently uploaded (20)

18+ Young ℂall Girls Vadodara Book Esha 7427069034 Top Class ℂall Girl Serviℂ...
18+ Young ℂall Girls Vadodara Book Esha 7427069034 Top Class ℂall Girl Serviℂ...18+ Young ℂall Girls Vadodara Book Esha 7427069034 Top Class ℂall Girl Serviℂ...
18+ Young ℂall Girls Vadodara Book Esha 7427069034 Top Class ℂall Girl Serviℂ...
 
Redefining Affordable Housing in Gurgaon The Role of Housing Architects from ...
Redefining Affordable Housing in Gurgaon The Role of Housing Architects from ...Redefining Affordable Housing in Gurgaon The Role of Housing Architects from ...
Redefining Affordable Housing in Gurgaon The Role of Housing Architects from ...
 
Design-System - FinTech - Isadora Agency
Design-System - FinTech - Isadora AgencyDesign-System - FinTech - Isadora Agency
Design-System - FinTech - Isadora Agency
 
Resume all my skills and educations and achievement
Resume all my skills and educations and  achievement Resume all my skills and educations and  achievement
Resume all my skills and educations and achievement
 
Jual Obat Aborsi Semarang ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Semarang ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Semarang ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Semarang ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
In Saudi Arabia Jeddah (+918761049707)) Buy Abortion Pills For Sale in Riyadh
In Saudi Arabia Jeddah (+918761049707)) Buy Abortion Pills For Sale in RiyadhIn Saudi Arabia Jeddah (+918761049707)) Buy Abortion Pills For Sale in Riyadh
In Saudi Arabia Jeddah (+918761049707)) Buy Abortion Pills For Sale in Riyadh
 
Furniture & Joinery Details_Designs.pptx
Furniture & Joinery Details_Designs.pptxFurniture & Joinery Details_Designs.pptx
Furniture & Joinery Details_Designs.pptx
 
一比一原版(ANU毕业证书)澳大利亚国立大学毕业证原件一模一样
一比一原版(ANU毕业证书)澳大利亚国立大学毕业证原件一模一样一比一原版(ANU毕业证书)澳大利亚国立大学毕业证原件一模一样
一比一原版(ANU毕业证书)澳大利亚国立大学毕业证原件一模一样
 
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
 
Edward Boginsky's Trailblazing Contributions to Printing
Edward Boginsky's Trailblazing Contributions to PrintingEdward Boginsky's Trailblazing Contributions to Printing
Edward Boginsky's Trailblazing Contributions to Printing
 
一比一定(购)滑铁卢大学毕业证(UW毕业证)成绩单学位证
一比一定(购)滑铁卢大学毕业证(UW毕业证)成绩单学位证一比一定(购)滑铁卢大学毕业证(UW毕业证)成绩单学位证
一比一定(购)滑铁卢大学毕业证(UW毕业证)成绩单学位证
 
如何办理(Columbia College毕业证书)纽约市哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(Columbia College毕业证书)纽约市哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(Columbia College毕业证书)纽约市哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(Columbia College毕业证书)纽约市哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
 
Academic Portfolio (2017-2021) .pdf
Academic Portfolio (2017-2021)      .pdfAcademic Portfolio (2017-2021)      .pdf
Academic Portfolio (2017-2021) .pdf
 
422368378-Laos-Architecture.pdfmmmmkkkkmmm
422368378-Laos-Architecture.pdfmmmmkkkkmmm422368378-Laos-Architecture.pdfmmmmkkkkmmm
422368378-Laos-Architecture.pdfmmmmkkkkmmm
 
NO1 Top Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...
NO1 Top Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...NO1 Top Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...
NO1 Top Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...
 
LANDSCAPE ARCHITECTURE PORTFOLIO - MAREK MITACEK
LANDSCAPE ARCHITECTURE PORTFOLIO - MAREK MITACEKLANDSCAPE ARCHITECTURE PORTFOLIO - MAREK MITACEK
LANDSCAPE ARCHITECTURE PORTFOLIO - MAREK MITACEK
 
Call Girl In Bhandara 💯Niamh 📲🔝6378878445🔝Call Girls No💰Advance Cash On Deliv...
Call Girl In Bhandara 💯Niamh 📲🔝6378878445🔝Call Girls No💰Advance Cash On Deliv...Call Girl In Bhandara 💯Niamh 📲🔝6378878445🔝Call Girls No💰Advance Cash On Deliv...
Call Girl In Bhandara 💯Niamh 📲🔝6378878445🔝Call Girls No💰Advance Cash On Deliv...
 
Essential UI/UX Design Principles: A Comprehensive Guide
Essential UI/UX Design Principles: A Comprehensive GuideEssential UI/UX Design Principles: A Comprehensive Guide
Essential UI/UX Design Principles: A Comprehensive Guide
 
Spring Summer 26 Colors Trend Book Peclers Paris
Spring Summer 26 Colors Trend Book Peclers ParisSpring Summer 26 Colors Trend Book Peclers Paris
Spring Summer 26 Colors Trend Book Peclers Paris
 
一比一原版澳洲堪培拉大学毕业证(UC毕业证书)毕业证成绩单留信认证
一比一原版澳洲堪培拉大学毕业证(UC毕业证书)毕业证成绩单留信认证一比一原版澳洲堪培拉大学毕业证(UC毕业证书)毕业证成绩单留信认证
一比一原版澳洲堪培拉大学毕业证(UC毕业证书)毕业证成绩单留信认证
 

01 - Topology.ppt

  • 2. 2 Intro  A network is a group of computers that are connected to share hardware and software.  The group can be as small and simple as two computers and a printer set up in a house or as large and complex as thousands of computers and hundreds of printers and other devices.  In order for the computers to communicate with each other, they must share three elements: a network media and topology, a protocol, and a software client or service.
  • 3. 3 The Functions of a Network  If the purpose of a network is to share resources among computer systems, what types of information and services are shared on a network and why?  Communication - videoconferencing, real-time chats, email.  Sharing hardware – printer, scanners, CD-ROM drives, tape drives  Data sharing – security is a major task  Application sharing - application can be run from a central location.  Data backup and retrieval – managed central backup
  • 4. 4 Peer-to-Peer Versus Client/Server  Peer-to-Peer  also known as a workgroup, is a low-cost, easily implemented network solution  generally used in small network environments that need to share a few files and may be some hardware, such as printers.  all systems are equal, or peers. Each system can share hardware or files and access the same things on other systems.  is often referred to as decentralized networking because the network files, data, and administration are not handled from a central location.
  • 5. 5
  • 6. 6 Pros and Cons  Advantages of Peer-to-Peer Networks  Cost - Because peer-to-peer networking does not require a dedicated server, such networks are very cost-effective.  Ease of installation  Disadvantages of Peer-to-Peer Networks  Security - security needs to be applied to each computer and resource individually.  Data backup - each system must have its data backed up individually.  Resource access - difficult to locate resources on the network.  Limited numbers of computers - Peer-to-peer networking is effective only on small networks (fewer than 10 computers).
  • 7. 7 Client/Server Networking Model  Scalable, allowing additional computers or other networked devices to be added with little difficulty.  Centralized management of all network services, security, and streamlined backup procedures.  two different types of computers are required: the client and the server.
  • 8. 8
  • 9. 9 Servers  workhorses of the network.  require additional resources and computing power.  servers also require a network operating system.  Microsoft Windows 2000/2003, Unix, Mac OS X servers, and Novell NetWare.  network may have a single server that offers more than one network service or hundreds of servers, each performing a dedicated task.
  • 10. 10 Client Computers  connect to the network and access the resources of the server.  Software is needed to allow the client to connect to the network, which is mostly now built in to desktop operating systems.
  • 11. 11 Pros and Cons  Advantages of Client/Server Networking  Centralized management and security  Scalability  Simplified backups  Disadvantages of Client/Server Networking  High cost - additional hardware and software costs  Administration requirements - needs technically skilled people to manage and maintain the network and the servers.  Single points of failure - If the server fails, the clients can't access the services that reside on the server. Great effort and expense are needed to ensure the high availability of network servers.
  • 12. 12 Distributed and Centralized Computing  The terms distributed and centralized computing describe the location on a network where the processing takes place.  In an environment such as a mainframe, the processing is performed on a centralized system that also stores all the data. In such a model, no data processing or data storage occurs on the client terminal.  In contrast, in a distributed processing environment, processing is performed in more than one place. If a network has servers and workstations, processing can take place on the server or on the client.
  • 13. 13 Topology  Basically, a topology is a shape, so a network topology is the shape of a network.  There is, however, a big difference between a physical network topology and a logical network topology. The physical network topology represents how the network looks to the naked eye—in other words, the way the components are arranged.  The logical network topology represents how the flow of information works its way through the network.
  • 14. 14 Bus  The bus topology was commonly used in earlier networks but is not seen much today. In a bus topology, a single cable connects all the computers.  A coaxial cable is used with special connectors called BNC and T connectors.  The bus only works if both ends of the cable have a special resistor installed called a terminator.
  • 15. 15
  • 16. 16 Pros and Cons  Pros  The bus topology is very simple and inexpensive to implement due to its low cost requirements for cable installation (there's only one main trunk).  Cons  Without the proper terminations in place, expect a very slow or inoperable network.  The cable itself is a single point of failure. One break, cut, or poor connection negatively impacts the entire LAN.  Because all workstations or devices share a common cable, troubleshooting can be difficult when problems occur. You must disrupt LAN service for troubleshooting.
  • 17. 17 Star  A star topology is a group of computers that are connected to a central location such as a hub or a switch.  This is the most common topology in use today.  The computers may be physically located next to each other or spread throughout an entire building, but the flow of information from each computer to the other computers must go through the central location.  Since each computer has its own connection, the failure of one computer will not affect the other computers in the network; however, if the hub or switch should fail, then all of the computers on that hub or switch will be affected.
  • 18. 18
  • 19. 19 Pros and Cons  Advantages  Management of the network is centralized around the hub and switch components.  Wiring installation is less obtrusive and therefore does not disrupt LAN service with the addition or deletion of nodes.  A cable cut or bad connector does not take down the entire LAN segment.  Disadvantage  The network component (hub or switch) is a single point of failure, and  a great deal of wiring is involved to implement the star.
  • 20. 20
  • 21. 21 Ring Topology  Ring topologies are more complex than the bus and star topologies, but they offer some attractive features.  Nodes logically communicate in a ring formation, with each node communicating only directly with its upstream and downstream neighbors.  You can probably picture what a mess the wiring would be in an office with hundreds of computer systems, if a network like this were implemented as a physical ring. So ring topologies are typically implemented in a physical star topology.
  • 22. 22 Pros and Cons  Pros  Token-controlled access provides greater overall bandwidth use.  Data packet transmission happens within a determinable time interval. This quality of ring topologies has made it a staple in situations in which timing is essential.  Because each node knows its upstream and downstream neighbors, this information can be used to determine where problems have occurred on the ring.  Cons  The firmware required to manage the ring is somewhat complicated and must be on every network card that participates in the ring which makes Token-Ring network adapters more expensive devices.
  • 23. 23 Mesh Topology  A mesh topology is an interlacing of multiple connections among several nodes. Typically, a mesh is done for one purpose: redundancy.  There are two types of mesh: full and partial.  Except in the smallest network, a full mesh is not very practical due to high cost.  Full mesh means that every node contained in a network has a connection to every other node contained in the network.  Partial meshes are designed to provide redundancy where it is needed.
  • 24. 24 Hybrid Topologies  Three popular hybrids are tree, hierarchical star, and star-wireless.  The figure below shows a tree hybrid combination that groups workstations in a star and joins the stars along a linear bus. The majority of the problems of the bus are eliminated because a single workstation cannot bring the entire LAN to a halt.
  • 25. 25 Hierarchical Star  Another method that can be used to connect hubs is a hierarchical star. This method uses a central hub to link several hubs that have workstations attached.  This method can be used to build very large LANs; however, there are restrictions on the size of the LAN.
  • 26. 26 Star-Wireless  The most recent hybrid topology has arrived with the advent of wireless technology.  Wireless LAN technology in its current implementation requires a user to be in the vicinity of an access point attached to the wired data network. A configuration such as this gives you an amorphous hybrid topology of star combined with wireless.