SlideShare a Scribd company logo
1 of 27
BusTopology
StarTopology
RingTopology
MeshTopology
HybridTopology
TreeTopology
BY LECTURER SURAJ PANDEY CCT
COLLEGE
Network Topologies
Types of Network Topology
BY LECTURER SURAJ PANDEY CCT
COLLEGE
Network Topology is the schematic description of a network
arrangement, connecting various nodes(sender and receiver)
through lines of connection.
BY LECTURER SURAJ PANDEY CCT
COLLEGE
BUS Topology
Bus topology is a network type in which every computer and
network device is connected to single cable. When it has
exactly two endpoints, then it is called Linear Bus
topology.
BY LECTURER SURAJ PANDEY CCT
COLLEGE
 Features of Bus Topology
1. It transmits data only in one direction.
2. Every device is connected to a single cable
 Advantages of Bus Topology
1. It is cost effective.
2. Cable required is least compared to other network topology.
3. Used in small networks.
4. It is easy to understand.
5. Easy to expand joining two cables together.
BY LECTURER SURAJ PANDEY CCT
COLLEGE
Disadvantages of Bus Topology
1. Cables fails then whole network fails.
2. If network traffic is heavy or nodes are more the
performance of the network decreases.
3. Cable has a limited length.
4. It is slower than the ring topology.
BY LECTURER SURAJ PANDEY CCT
COLLEGE
RING Topology
It is called ring topology because it forms a ring as each
computer is connected to another computer, with the last
one connected to the first. Exactly two neighbours for each
device.
BY LECTURER SURAJ PANDEY CCT
COLLEGE
 Features of Ring Topology
1. A number of repeaters are used for Ring topology with large number of
nodes, because if someone wants to send some data to the last node in
the ring topology with 100 nodes, then the data will have to pass
through 99 nodes to reach the 100th node. Hence to prevent data loss
repeaters are used in the network.
2. The transmission is unidirectional, but it can be made bidirectional by
having 2 connections between each Network Node, it is called Dual
Ring Topology.
3. In Dual Ring Topology, two ring networks are formed, and data flow is
in opposite direction in them. Also, if one ring fails, the second ring can
act as a backup, to keep the network up.
4. Data is transferred in a sequential manner that is bit by bit. Data
transmitted, has to pass through each node of the network, till the
destination node.
BY LECTURER SURAJ PANDEY CCT
COLLEGE
Advantages of Ring Topology
1. Transmitting network is not affected by high traffic or by
adding more nodes, as only the nodes having tokens can
transmit data.
2. Cheap to install and expand
Disadvantages of Ring Topology
1. Troubleshooting is difficult in ring topology.
2. Adding or deleting the computers disturbs the network
activity.
3. Failure of one computer disturbs the whole network.
BY LECTURER SURAJ PANDEY CCT
COLLEGE
STAR Topology
In this type of topology all the computers are connected to a
single hub through a cable. This hub is the central node and
all others nodes are connected to the central node.
BY LECTURER SURAJ PANDEY CCT
COLLEGE
Features of Star Topology
1. Every node has its own dedicated connection to the hub.
2. Hub acts as a repeater for data flow.
3. Can be used with twisted pair, Optical Fibre or coaxial
cable.
BY LECTURER SURAJ PANDEY CCT
COLLEGE
 Advantages of Star Topology
1. Fast performance with few nodes and low network traffic.
2. Hub can be upgraded easily.
3. Easy to troubleshoot.
4. Easy to setup and modify.
5. Only that node is affected which has failed, rest of the nodes can work
smoothly.
 Disadvantages of Star Topology
1. Cost of installation is high.
2. Expensive to use.
3. If the hub fails then the whole network is stopped because all the nodes
depend on the hub.
4. Performance is based on the hub that is it depends on its capacity
BY LECTURER SURAJ PANDEY CCT
COLLEGE
MESH Topology
It is a point-to-point connection to other nodes or devices.
All the network nodes are connected to each other. Mesh has
n(n-2)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh
topology, they are :
1. Routing
2. Flooding
BY LECTURER SURAJ PANDEY CCT
COLLEGE
 Routing
 In routing, the nodes have a routing logic, as per the network
requirements. Like routing logic to direct the data to reach the
destination using the shortest distance. Or, routing logic which
has information about the broken links, and it avoids those node
etc. We can even have routing logic, to re-configure the failed
nodes.
 Flooding
 In flooding, the same data is transmitted to all the network nodes,
hence no routing logic is required. The network is robust, and the
its very unlikely to lose the data. But it leads to unwanted load
over the network.
BY LECTURER SURAJ PANDEY CCT
COLLEGE
BY LECTURER SURAJ PANDEY CCT
COLLEGE
Types of Mesh Topology
1. Partial Mesh Topology : In this topology some of the
systems are connected in the same fashion as mesh topology
but some devices are only connected to two or three devices.
2. Full Mesh Topology : Each and every nodes or devices are
connected to each other.
Features of Mesh Topology
1. Fully connected.
2. Robust.
3. Not flexible.
BY LECTURER SURAJ PANDEY CCT
COLLEGE
Advantages of Mesh Topology
1. Each connection can carry its own data load.
2. It is robust.
3. Fault is diagnosed easily.
4. Provides security and privacy.
Disadvantages of Mesh Topology
1. Installation and configuration is difficult.
2. Cabling cost is more.
3. Bulk wiring is required.
BY LECTURER SURAJ PANDEY CCT
COLLEGE
TREE Topology
It has a root node and all other nodes are connected to it
forming a hierarchy. It is also called hierarchical topology. It
should at least have three levels to the hierarchy.
BY LECTURER SURAJ PANDEY CCT
COLLEGE
 Features of Tree Topology
1. Ideal if workstations are located in groups.
2. Used in Wide Area Network.
 Advantages of Tree Topology
1. Extension of bus and star topologies.
2. Expansion of nodes is possible and easy.
3. Easily managed and maintained.
 Error detection is easily done.
 Disadvantages of Tree Topology
1. Heavily cabled.
2. Costly.
3. If more nodes are added maintenance is difficult.
4. Central hub fails, network fails.
BY LECTURER SURAJ PANDEY CCT
COLLEGE
HYBRID Topology
It is two different types of topologies which is a mixture of
two or more topologies. For example if in an office in one
department ring topology is used and in another star
topology is used, connecting these topologies will result in
Hybrid Topology (ring topology and star topology).
BY LECTURER SURAJ PANDEY CCT
COLLEGE
BY LECTURER SURAJ PANDEY CCT
COLLEGE
 Features of Hybrid Topology
1. It is a combination of two or topologies
2. Inherits the advantages and disadvantages of the topologies
included
 Advantages of Hybrid Topology
1. Reliable as Error detecting and trouble shooting is easy.
2. Effective.
3. Scalable as size can be increased easily.
4. Flexible.
 Disadvantages of Hybrid Topology
1. Complex in design.
2. Costly.
Trends in Telecommunication
Major trends occurring in the field of telecommunication
have a significant impact on management decisions in this
area. Informed managerial end users should thus be aware of
major trends in telecommunications, industries,
technologies, and applications that significantly increase the
decision alternatives confronting their organizations.
BY LECTURER SURAJ PANDEY CCT
COLLEGE
Industry Trends
Telecommunication networks and services are available from
numerous large and small telecommunications companies.
Explosive growth of the internet and the world wide web has
created a host of new telecommunications, products,
services and providers.
Business firms have dramatically increased their use of the
internet and the web for electronic commerce and
collaboration.
BY LECTURER SURAJ PANDEY CCT
COLLEGE
Technology Trends
Open systems with unrestricted connectivity, using Internet
networking technologies as their technology platform, are
becoming the primary telecommunications technology drivers.
Increased industry and technical moves towards building
client/server networks based on open system architecture.
Open systems are information systems that use common
standards for hardware, software, applications and networking.
Change from analog to digital network technologies. Local and
global telecommunications networks are rapidly converting to
digital transmission technologies that transmit
BY LECTURER SURAJ PANDEY CCT
COLLEGE
Change in communication media, many telecommunications
networks are changing from copper wire-based media and
land-based microwave relay systems to fiber optic lines and
communications satellite transmissions. Fiber optic
transmission, which uses pulses of a laser-generated light, offer
significant advantages in terms of:
1.Reduced size and installation effort
2.Greater communication capacity
3.Faster transmission speeds
4.Freedom from electrical interference
BY LECTURER SURAJ PANDEY CCT
COLLEGE
Business Application Trends
The trend toward more vendors, services, internet
technologies and open systems, and the rapid growth of the
internet, the WWW, and corporate intranets and extranets,
dramatically increases the number of feasible
telecommunications applications.
Telecommunications networks are playing a vital role and
pervasive role in e-commerce, enterprise collaboration, and
internal business applications that support the operations,
management and strategic objectives of both large and small
companies.
BY LECTURER SURAJ PANDEY CCT
COLLEGE
Telecommunications functions have become an integral part of
local and global computer networks that are used to
dramatically:
1. Cut costs
2. Shorten business lead times and response times
3. Support e-commerce
4. Improve the collaboration of workgroups
5. Develop online operational processes
6. Share resources
7. Develop new products and services
BY LECTURER SURAJ PANDEY CCT
COLLEGE

More Related Content

What's hot

Third and fourth generation programming language
Third and fourth generation programming languageThird and fourth generation programming language
Third and fourth generation programming languageomeed
 
Database security
Database securityDatabase security
Database securityCAS
 
Modern+digital+electronics rp+jain
Modern+digital+electronics rp+jainModern+digital+electronics rp+jain
Modern+digital+electronics rp+jainVenugopala Rao P
 
Cyber-Security & Hacking
Cyber-Security & HackingCyber-Security & Hacking
Cyber-Security & HackingZayedMufti
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and AwarenessSanjiv Arora
 
Digital Logic & Design (DLD) presentation
Digital Logic & Design (DLD) presentationDigital Logic & Design (DLD) presentation
Digital Logic & Design (DLD) presentationfoyez ahammad
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
10. switch case
10. switch case10. switch case
10. switch caseWay2itech
 
Problem Solving Techniques and Introduction to C
Problem Solving Techniques and Introduction to CProblem Solving Techniques and Introduction to C
Problem Solving Techniques and Introduction to CPrabu U
 
Write programs to solve problems pascal programming
Write programs to solve problems   pascal programmingWrite programs to solve problems   pascal programming
Write programs to solve problems pascal programmingAnutthara Senanayake
 
Digital Logic & Computer Architecture Practical Book by Yasir Ahmed Khan
Digital Logic & Computer Architecture Practical Book by Yasir Ahmed KhanDigital Logic & Computer Architecture Practical Book by Yasir Ahmed Khan
Digital Logic & Computer Architecture Practical Book by Yasir Ahmed KhanYasir Khan
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoorsGaurav Dalvi
 

What's hot (20)

Third and fourth generation programming language
Third and fourth generation programming languageThird and fourth generation programming language
Third and fourth generation programming language
 
Database security
Database securityDatabase security
Database security
 
Sql injection
Sql injectionSql injection
Sql injection
 
Modern+digital+electronics rp+jain
Modern+digital+electronics rp+jainModern+digital+electronics rp+jain
Modern+digital+electronics rp+jain
 
Cyber-Security & Hacking
Cyber-Security & HackingCyber-Security & Hacking
Cyber-Security & Hacking
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
 
Digital Logic & Design (DLD) presentation
Digital Logic & Design (DLD) presentationDigital Logic & Design (DLD) presentation
Digital Logic & Design (DLD) presentation
 
Owasp webgoat
Owasp webgoatOwasp webgoat
Owasp webgoat
 
Object-oriented concepts
Object-oriented conceptsObject-oriented concepts
Object-oriented concepts
 
Network security
Network securityNetwork security
Network security
 
10. switch case
10. switch case10. switch case
10. switch case
 
Problem Solving Techniques and Introduction to C
Problem Solving Techniques and Introduction to CProblem Solving Techniques and Introduction to C
Problem Solving Techniques and Introduction to C
 
Flipflop
FlipflopFlipflop
Flipflop
 
Write programs to solve problems pascal programming
Write programs to solve problems   pascal programmingWrite programs to solve problems   pascal programming
Write programs to solve problems pascal programming
 
Simple Calculator Flowchart
Simple Calculator FlowchartSimple Calculator Flowchart
Simple Calculator Flowchart
 
Introduction to c++ ppt 1
Introduction to c++ ppt 1Introduction to c++ ppt 1
Introduction to c++ ppt 1
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Registers
RegistersRegisters
Registers
 
Digital Logic & Computer Architecture Practical Book by Yasir Ahmed Khan
Digital Logic & Computer Architecture Practical Book by Yasir Ahmed KhanDigital Logic & Computer Architecture Practical Book by Yasir Ahmed Khan
Digital Logic & Computer Architecture Practical Book by Yasir Ahmed Khan
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 

Similar to Computer Fundamental Network topologies

Similar to Computer Fundamental Network topologies (20)

Network using topologies
Network using topologiesNetwork using topologies
Network using topologies
 
Network topology
Network topology Network topology
Network topology
 
Lesson 8
Lesson 8Lesson 8
Lesson 8
 
Network topology
Network topologyNetwork topology
Network topology
 
Network Typologies.
Network Typologies.Network Typologies.
Network Typologies.
 
Cn,3,com net
Cn,3,com netCn,3,com net
Cn,3,com net
 
Different types of network topologies
Different types of network topologiesDifferent types of network topologies
Different types of network topologies
 
Network topology (Details Descriptions with Examples)
Network topology (Details Descriptions with Examples)Network topology (Details Descriptions with Examples)
Network topology (Details Descriptions with Examples)
 
report.pptx
report.pptxreport.pptx
report.pptx
 
Note -02
Note -02Note -02
Note -02
 
networking topology
networking topologynetworking topology
networking topology
 
NETWORK TOPOLOGIES IN COMPUTER NETWORKING.pptx
NETWORK TOPOLOGIES IN COMPUTER NETWORKING.pptxNETWORK TOPOLOGIES IN COMPUTER NETWORKING.pptx
NETWORK TOPOLOGIES IN COMPUTER NETWORKING.pptx
 
Topology
TopologyTopology
Topology
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Class work3
Class work3Class work3
Class work3
 
Network topology
Network topologyNetwork topology
Network topology
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Different types of Topology
Different types of TopologyDifferent types of Topology
Different types of Topology
 
Distributed Structure System
Distributed Structure SystemDistributed Structure System
Distributed Structure System
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 

More from suraj pandey

Systemcare in computer
Systemcare in computer Systemcare in computer
Systemcare in computer suraj pandey
 
vb.net Constructor and destructor
vb.net Constructor and destructorvb.net Constructor and destructor
vb.net Constructor and destructorsuraj pandey
 
Overloading and overriding in vb.net
Overloading and overriding in vb.netOverloading and overriding in vb.net
Overloading and overriding in vb.netsuraj pandey
 
Basic in Computernetwork
Basic in ComputernetworkBasic in Computernetwork
Basic in Computernetworksuraj pandey
 
History of computer
History of computerHistory of computer
History of computersuraj pandey
 
Basic of Internet&email
Basic of Internet&emailBasic of Internet&email
Basic of Internet&emailsuraj pandey
 
Basic fundamental Computer input/output Accessories
Basic fundamental Computer input/output AccessoriesBasic fundamental Computer input/output Accessories
Basic fundamental Computer input/output Accessoriessuraj pandey
 
Introduction of exception in vb.net
Introduction of exception in vb.netIntroduction of exception in vb.net
Introduction of exception in vb.netsuraj pandey
 
Transmission mediums in computer networks
Transmission mediums in computer networksTransmission mediums in computer networks
Transmission mediums in computer networkssuraj pandey
 
Introduction to vb.net
Introduction to vb.netIntroduction to vb.net
Introduction to vb.netsuraj pandey
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computersuraj pandey
 
Basic of Computer software
Basic of Computer softwareBasic of Computer software
Basic of Computer softwaresuraj pandey
 
Basic using of Swing in Java
Basic using of Swing in JavaBasic using of Swing in Java
Basic using of Swing in Javasuraj pandey
 
Basic Networking in Java
Basic Networking in JavaBasic Networking in Java
Basic Networking in Javasuraj pandey
 
Basic Java Database Connectivity(JDBC)
Basic Java Database Connectivity(JDBC)Basic Java Database Connectivity(JDBC)
Basic Java Database Connectivity(JDBC)suraj pandey
 
Graphical User Interface in JAVA
Graphical User Interface in JAVAGraphical User Interface in JAVA
Graphical User Interface in JAVAsuraj pandey
 

More from suraj pandey (20)

Systemcare in computer
Systemcare in computer Systemcare in computer
Systemcare in computer
 
vb.net Constructor and destructor
vb.net Constructor and destructorvb.net Constructor and destructor
vb.net Constructor and destructor
 
Overloading and overriding in vb.net
Overloading and overriding in vb.netOverloading and overriding in vb.net
Overloading and overriding in vb.net
 
Basic in Computernetwork
Basic in ComputernetworkBasic in Computernetwork
Basic in Computernetwork
 
Computer hardware
Computer hardwareComputer hardware
Computer hardware
 
Dos commands new
Dos commands new Dos commands new
Dos commands new
 
History of computer
History of computerHistory of computer
History of computer
 
Dos commands
Dos commandsDos commands
Dos commands
 
Basic of Internet&email
Basic of Internet&emailBasic of Internet&email
Basic of Internet&email
 
Basic fundamental Computer input/output Accessories
Basic fundamental Computer input/output AccessoriesBasic fundamental Computer input/output Accessories
Basic fundamental Computer input/output Accessories
 
Introduction of exception in vb.net
Introduction of exception in vb.netIntroduction of exception in vb.net
Introduction of exception in vb.net
 
Transmission mediums in computer networks
Transmission mediums in computer networksTransmission mediums in computer networks
Transmission mediums in computer networks
 
Introduction to vb.net
Introduction to vb.netIntroduction to vb.net
Introduction to vb.net
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Basic of Computer software
Basic of Computer softwareBasic of Computer software
Basic of Computer software
 
Basic using of Swing in Java
Basic using of Swing in JavaBasic using of Swing in Java
Basic using of Swing in Java
 
Basic Networking in Java
Basic Networking in JavaBasic Networking in Java
Basic Networking in Java
 
Basic Java Database Connectivity(JDBC)
Basic Java Database Connectivity(JDBC)Basic Java Database Connectivity(JDBC)
Basic Java Database Connectivity(JDBC)
 
Graphical User Interface in JAVA
Graphical User Interface in JAVAGraphical User Interface in JAVA
Graphical User Interface in JAVA
 
Generics in java
Generics in javaGenerics in java
Generics in java
 

Recently uploaded

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 

Recently uploaded (20)

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 

Computer Fundamental Network topologies

  • 2. Types of Network Topology BY LECTURER SURAJ PANDEY CCT COLLEGE Network Topology is the schematic description of a network arrangement, connecting various nodes(sender and receiver) through lines of connection.
  • 3. BY LECTURER SURAJ PANDEY CCT COLLEGE BUS Topology Bus topology is a network type in which every computer and network device is connected to single cable. When it has exactly two endpoints, then it is called Linear Bus topology.
  • 4. BY LECTURER SURAJ PANDEY CCT COLLEGE  Features of Bus Topology 1. It transmits data only in one direction. 2. Every device is connected to a single cable  Advantages of Bus Topology 1. It is cost effective. 2. Cable required is least compared to other network topology. 3. Used in small networks. 4. It is easy to understand. 5. Easy to expand joining two cables together.
  • 5. BY LECTURER SURAJ PANDEY CCT COLLEGE Disadvantages of Bus Topology 1. Cables fails then whole network fails. 2. If network traffic is heavy or nodes are more the performance of the network decreases. 3. Cable has a limited length. 4. It is slower than the ring topology.
  • 6. BY LECTURER SURAJ PANDEY CCT COLLEGE RING Topology It is called ring topology because it forms a ring as each computer is connected to another computer, with the last one connected to the first. Exactly two neighbours for each device.
  • 7. BY LECTURER SURAJ PANDEY CCT COLLEGE  Features of Ring Topology 1. A number of repeaters are used for Ring topology with large number of nodes, because if someone wants to send some data to the last node in the ring topology with 100 nodes, then the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss repeaters are used in the network. 2. The transmission is unidirectional, but it can be made bidirectional by having 2 connections between each Network Node, it is called Dual Ring Topology. 3. In Dual Ring Topology, two ring networks are formed, and data flow is in opposite direction in them. Also, if one ring fails, the second ring can act as a backup, to keep the network up. 4. Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass through each node of the network, till the destination node.
  • 8. BY LECTURER SURAJ PANDEY CCT COLLEGE Advantages of Ring Topology 1. Transmitting network is not affected by high traffic or by adding more nodes, as only the nodes having tokens can transmit data. 2. Cheap to install and expand Disadvantages of Ring Topology 1. Troubleshooting is difficult in ring topology. 2. Adding or deleting the computers disturbs the network activity. 3. Failure of one computer disturbs the whole network.
  • 9. BY LECTURER SURAJ PANDEY CCT COLLEGE STAR Topology In this type of topology all the computers are connected to a single hub through a cable. This hub is the central node and all others nodes are connected to the central node.
  • 10. BY LECTURER SURAJ PANDEY CCT COLLEGE Features of Star Topology 1. Every node has its own dedicated connection to the hub. 2. Hub acts as a repeater for data flow. 3. Can be used with twisted pair, Optical Fibre or coaxial cable.
  • 11. BY LECTURER SURAJ PANDEY CCT COLLEGE  Advantages of Star Topology 1. Fast performance with few nodes and low network traffic. 2. Hub can be upgraded easily. 3. Easy to troubleshoot. 4. Easy to setup and modify. 5. Only that node is affected which has failed, rest of the nodes can work smoothly.  Disadvantages of Star Topology 1. Cost of installation is high. 2. Expensive to use. 3. If the hub fails then the whole network is stopped because all the nodes depend on the hub. 4. Performance is based on the hub that is it depends on its capacity
  • 12. BY LECTURER SURAJ PANDEY CCT COLLEGE MESH Topology It is a point-to-point connection to other nodes or devices. All the network nodes are connected to each other. Mesh has n(n-2)/2 physical channels to link n devices. There are two techniques to transmit data over the Mesh topology, they are : 1. Routing 2. Flooding
  • 13. BY LECTURER SURAJ PANDEY CCT COLLEGE  Routing  In routing, the nodes have a routing logic, as per the network requirements. Like routing logic to direct the data to reach the destination using the shortest distance. Or, routing logic which has information about the broken links, and it avoids those node etc. We can even have routing logic, to re-configure the failed nodes.  Flooding  In flooding, the same data is transmitted to all the network nodes, hence no routing logic is required. The network is robust, and the its very unlikely to lose the data. But it leads to unwanted load over the network.
  • 14. BY LECTURER SURAJ PANDEY CCT COLLEGE
  • 15. BY LECTURER SURAJ PANDEY CCT COLLEGE Types of Mesh Topology 1. Partial Mesh Topology : In this topology some of the systems are connected in the same fashion as mesh topology but some devices are only connected to two or three devices. 2. Full Mesh Topology : Each and every nodes or devices are connected to each other. Features of Mesh Topology 1. Fully connected. 2. Robust. 3. Not flexible.
  • 16. BY LECTURER SURAJ PANDEY CCT COLLEGE Advantages of Mesh Topology 1. Each connection can carry its own data load. 2. It is robust. 3. Fault is diagnosed easily. 4. Provides security and privacy. Disadvantages of Mesh Topology 1. Installation and configuration is difficult. 2. Cabling cost is more. 3. Bulk wiring is required.
  • 17. BY LECTURER SURAJ PANDEY CCT COLLEGE TREE Topology It has a root node and all other nodes are connected to it forming a hierarchy. It is also called hierarchical topology. It should at least have three levels to the hierarchy.
  • 18. BY LECTURER SURAJ PANDEY CCT COLLEGE  Features of Tree Topology 1. Ideal if workstations are located in groups. 2. Used in Wide Area Network.  Advantages of Tree Topology 1. Extension of bus and star topologies. 2. Expansion of nodes is possible and easy. 3. Easily managed and maintained.  Error detection is easily done.  Disadvantages of Tree Topology 1. Heavily cabled. 2. Costly. 3. If more nodes are added maintenance is difficult. 4. Central hub fails, network fails.
  • 19. BY LECTURER SURAJ PANDEY CCT COLLEGE HYBRID Topology It is two different types of topologies which is a mixture of two or more topologies. For example if in an office in one department ring topology is used and in another star topology is used, connecting these topologies will result in Hybrid Topology (ring topology and star topology).
  • 20. BY LECTURER SURAJ PANDEY CCT COLLEGE
  • 21. BY LECTURER SURAJ PANDEY CCT COLLEGE  Features of Hybrid Topology 1. It is a combination of two or topologies 2. Inherits the advantages and disadvantages of the topologies included  Advantages of Hybrid Topology 1. Reliable as Error detecting and trouble shooting is easy. 2. Effective. 3. Scalable as size can be increased easily. 4. Flexible.  Disadvantages of Hybrid Topology 1. Complex in design. 2. Costly.
  • 22. Trends in Telecommunication Major trends occurring in the field of telecommunication have a significant impact on management decisions in this area. Informed managerial end users should thus be aware of major trends in telecommunications, industries, technologies, and applications that significantly increase the decision alternatives confronting their organizations. BY LECTURER SURAJ PANDEY CCT COLLEGE
  • 23. Industry Trends Telecommunication networks and services are available from numerous large and small telecommunications companies. Explosive growth of the internet and the world wide web has created a host of new telecommunications, products, services and providers. Business firms have dramatically increased their use of the internet and the web for electronic commerce and collaboration. BY LECTURER SURAJ PANDEY CCT COLLEGE
  • 24. Technology Trends Open systems with unrestricted connectivity, using Internet networking technologies as their technology platform, are becoming the primary telecommunications technology drivers. Increased industry and technical moves towards building client/server networks based on open system architecture. Open systems are information systems that use common standards for hardware, software, applications and networking. Change from analog to digital network technologies. Local and global telecommunications networks are rapidly converting to digital transmission technologies that transmit BY LECTURER SURAJ PANDEY CCT COLLEGE
  • 25. Change in communication media, many telecommunications networks are changing from copper wire-based media and land-based microwave relay systems to fiber optic lines and communications satellite transmissions. Fiber optic transmission, which uses pulses of a laser-generated light, offer significant advantages in terms of: 1.Reduced size and installation effort 2.Greater communication capacity 3.Faster transmission speeds 4.Freedom from electrical interference BY LECTURER SURAJ PANDEY CCT COLLEGE
  • 26. Business Application Trends The trend toward more vendors, services, internet technologies and open systems, and the rapid growth of the internet, the WWW, and corporate intranets and extranets, dramatically increases the number of feasible telecommunications applications. Telecommunications networks are playing a vital role and pervasive role in e-commerce, enterprise collaboration, and internal business applications that support the operations, management and strategic objectives of both large and small companies. BY LECTURER SURAJ PANDEY CCT COLLEGE
  • 27. Telecommunications functions have become an integral part of local and global computer networks that are used to dramatically: 1. Cut costs 2. Shorten business lead times and response times 3. Support e-commerce 4. Improve the collaboration of workgroups 5. Develop online operational processes 6. Share resources 7. Develop new products and services BY LECTURER SURAJ PANDEY CCT COLLEGE