SlideShare a Scribd company logo
1 of 19
SALWAA NUUR AZZAHRA
Understanding , a varietyof computernetwork topology ~ We have had
many users device topology network computers, particularly in offices
and so on. Its use is helping to facilitate the access of the data to the
server simultaneously. This is the main reason for the formation of
the computer network topology. And along with the development of
the network is also developing a variety of network topologies that
computer.
Understanding the network topology is a technique
to connect one computer to another computer
that assemble into a network, where the network
topology is based on the use of cost, speed of
data access, the size and the level of connectivity
that will affect the quality and efiensi a
network. There are various kinds of network
topology many computers in use today include
Bus Topology, Ring Topology, Star Topology,
Mesh Topology, Linear Topology, each of these
topology types have their own advantages and
the minuts
3. STAR TOPOLOGY
6. LINEAR TOPOLOGY
Kliksaja
This type of bus topology
uses a single cable, the
entire computer is directly
interconnected using only
one cable. Cable that
connects this network is
using coaxial cables and
attached to the T-
Connector.
1 .Topology Bus
To maximize the use of this network should use
the Fiber Optic cable for stability of resistance
that can transmit the data better.
Excess Bus Topology:
1. Easy to be developed
2. Does not require a lot of cable
3. Save the cost of installation of a
bus topology Weaknesses:
Unstable, if one computer is
interrupted then the network will
be disrupted
Error detection rate is very small
Difficult to find interference on
the network
This type of ring topology,
all computers are
connected together to
form a circle (ring)
covered and assisted by
token, token contains
information derived from
the source computer will
check whether the
information is used by
the point in question,
if there is then the token will provide data that
requested by the network point and headed to the
next point.
all of the computers will receive any signal
flowing information, the information will be
accepted if it is in conformity with the
address, and the signal will be ignored if
the information is not the address itself.
In other words, this process will continue
until the data signal is received at the
destination. Advantages:
1. Do not use a lot of wiring
2.Installation of a low level of complexity
3. Easy installation
4. Not going to happen hit the data
5. Easily designed Disadvantages:
1. sensitive network error
2. Difficult to develop
3. If one point disrupted the entire network of data
communications can be disrupted
On the type of star topology, each computer is
directly connected using a hub, where the
function of this Hub is a traffic control all
computers connected.Because it uses the
process of sending and receiving information
directly is what causes the installation costs
Advantages: 1. Error detection is performed
2. Change the station easy to do and does not
interfere with other networks
3. Easily control
4. High security level
5. The most flexibleDisadvantages:
Using a lot of wiring
There is a possibility of data collision will
occur which can result in slow network
Network is dependent upon the central
terminal
High network costs
If the computer is the center point of the
This tree topology
is a result of the
development of
the star topology
and bus topology
consists of a
collection of star
topology and bus
topology
associated with
1. Tree topology is usually referred to
as the network topology and used
multilevel interconnection between
topology of this tree has the same strengths and
weaknesses with a star topology, among others: Pros:
1. Error detection is performed
2 . Changes in the shape of a group is easy to do and
does not interfere with other networks
At this network has several levels with a
specified node hierarchy, the picture is the
higher the position, the higher its
hierarchy. Each node that has a high position
who has a node can set a low position. Data sent
from the central node and then move towards a
low node and leading to higher node first.
3.Easily control Disadvantages:
Using a lot of wiring
Frequent collisions
If the node is higher then the damaged
lower node will be interrupted too
How it works slow
Mesh topology is a
series of
interconnected
networks where
each device
absolutely
computers will be
connected directly
to any point other
devices. Each point
has a point that
Advantages:
1. Dynamic point in repairing any damage to
computer networks
2. The data is sent directly to the destination
without having to go through another computer
3. The data faster data transmission process
4. If there is damage to one of the
computers will not interfere with other
computer Disadvantages:
The cost to set it up so big.
Need a lot of cable
It should be a lot of I / O ports, each
computer is required n-1 I / O port
and as many as n (n-1) / 2
connections. For example, there are 4
computers will require a cable
connection 4 (4-1) / 2 = 6 cable and
requires 4-1 = 3 ports.
This is an extension
of the topology of
a bus topology in
which the main
cables should be
connected to a
computer each
point using the T-
connector. The
topology of this
Advantages:
1. Simple network
2. Save the cable
3. Easily expandable Disadvantages:
1. Detection of very small mistakes
2. Safety not guaranteed
3. High data traffic
4. The transfer speed depends on the
number of users, speed down if the
number of users increases That
article understanding of a variety of
computer network topology , hopefully
can provide benefits, greetings

More Related Content

What's hot

What's hot (20)

Network topology
Network topologyNetwork topology
Network topology
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
TOPOLOGy
TOPOLOGyTOPOLOGy
TOPOLOGy
 
Topology
TopologyTopology
Topology
 
Topology
TopologyTopology
Topology
 
Topology
TopologyTopology
Topology
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Topology
TopologyTopology
Topology
 
Topology And Mesh Topology Group Presentation
Topology And Mesh Topology Group PresentationTopology And Mesh Topology Group Presentation
Topology And Mesh Topology Group Presentation
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Topologys
TopologysTopologys
Topologys
 
Topology
TopologyTopology
Topology
 
NETWORK TOPOLOGY
NETWORK TOPOLOGYNETWORK TOPOLOGY
NETWORK TOPOLOGY
 
Fundamentals in Computer Networking.pptx
Fundamentals in Computer Networking.pptxFundamentals in Computer Networking.pptx
Fundamentals in Computer Networking.pptx
 
Data comminication network
Data comminication networkData comminication network
Data comminication network
 
Network Topologies
Network Topologies Network Topologies
Network Topologies
 
Network topology
Network topologyNetwork topology
Network topology
 
Different types of network topologies
Different types of network topologiesDifferent types of network topologies
Different types of network topologies
 

Similar to Topoligy network

Similar to Topoligy network (20)

Note -02
Note -02Note -02
Note -02
 
Cn,3,com net
Cn,3,com netCn,3,com net
Cn,3,com net
 
report.pptx
report.pptxreport.pptx
report.pptx
 
Lesson 8
Lesson 8Lesson 8
Lesson 8
 
Networking hard copy (1)
Networking  hard copy (1)Networking  hard copy (1)
Networking hard copy (1)
 
Network topology
Network topologyNetwork topology
Network topology
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01
 
Topology
Topology Topology
Topology
 
Types of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterTypes of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouter
 
Topology
TopologyTopology
Topology
 
Network using topologies
Network using topologiesNetwork using topologies
Network using topologies
 
Iwt
IwtIwt
Iwt
 
Network topology
Network topologyNetwork topology
Network topology
 
Unit 1_ Network Topologies session 2.pptx
Unit 1_ Network Topologies session 2.pptxUnit 1_ Network Topologies session 2.pptx
Unit 1_ Network Topologies session 2.pptx
 
network topology
network topologynetwork topology
network topology
 
Networking notes2
Networking notes2Networking notes2
Networking notes2
 
Note 2
Note 2Note 2
Note 2
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Network topology
Network topologyNetwork topology
Network topology
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Topoligy network

  • 2. Understanding , a varietyof computernetwork topology ~ We have had many users device topology network computers, particularly in offices and so on. Its use is helping to facilitate the access of the data to the server simultaneously. This is the main reason for the formation of the computer network topology. And along with the development of the network is also developing a variety of network topologies that computer.
  • 3. Understanding the network topology is a technique to connect one computer to another computer that assemble into a network, where the network topology is based on the use of cost, speed of data access, the size and the level of connectivity that will affect the quality and efiensi a network. There are various kinds of network topology many computers in use today include Bus Topology, Ring Topology, Star Topology, Mesh Topology, Linear Topology, each of these topology types have their own advantages and the minuts
  • 4. 3. STAR TOPOLOGY 6. LINEAR TOPOLOGY Kliksaja
  • 5. This type of bus topology uses a single cable, the entire computer is directly interconnected using only one cable. Cable that connects this network is using coaxial cables and attached to the T- Connector. 1 .Topology Bus To maximize the use of this network should use the Fiber Optic cable for stability of resistance that can transmit the data better.
  • 6. Excess Bus Topology: 1. Easy to be developed 2. Does not require a lot of cable 3. Save the cost of installation of a bus topology Weaknesses: Unstable, if one computer is interrupted then the network will be disrupted Error detection rate is very small Difficult to find interference on the network
  • 7. This type of ring topology, all computers are connected together to form a circle (ring) covered and assisted by token, token contains information derived from the source computer will check whether the information is used by the point in question, if there is then the token will provide data that requested by the network point and headed to the next point.
  • 8. all of the computers will receive any signal flowing information, the information will be accepted if it is in conformity with the address, and the signal will be ignored if the information is not the address itself. In other words, this process will continue until the data signal is received at the destination. Advantages: 1. Do not use a lot of wiring 2.Installation of a low level of complexity 3. Easy installation 4. Not going to happen hit the data
  • 9. 5. Easily designed Disadvantages: 1. sensitive network error 2. Difficult to develop 3. If one point disrupted the entire network of data communications can be disrupted
  • 10. On the type of star topology, each computer is directly connected using a hub, where the function of this Hub is a traffic control all computers connected.Because it uses the process of sending and receiving information directly is what causes the installation costs
  • 11. Advantages: 1. Error detection is performed 2. Change the station easy to do and does not interfere with other networks 3. Easily control 4. High security level 5. The most flexibleDisadvantages: Using a lot of wiring There is a possibility of data collision will occur which can result in slow network Network is dependent upon the central terminal High network costs If the computer is the center point of the
  • 12. This tree topology is a result of the development of the star topology and bus topology consists of a collection of star topology and bus topology associated with 1. Tree topology is usually referred to as the network topology and used multilevel interconnection between
  • 13. topology of this tree has the same strengths and weaknesses with a star topology, among others: Pros: 1. Error detection is performed 2 . Changes in the shape of a group is easy to do and does not interfere with other networks At this network has several levels with a specified node hierarchy, the picture is the higher the position, the higher its hierarchy. Each node that has a high position who has a node can set a low position. Data sent from the central node and then move towards a low node and leading to higher node first.
  • 14. 3.Easily control Disadvantages: Using a lot of wiring Frequent collisions If the node is higher then the damaged lower node will be interrupted too How it works slow
  • 15. Mesh topology is a series of interconnected networks where each device absolutely computers will be connected directly to any point other devices. Each point has a point that
  • 16. Advantages: 1. Dynamic point in repairing any damage to computer networks 2. The data is sent directly to the destination without having to go through another computer 3. The data faster data transmission process
  • 17. 4. If there is damage to one of the computers will not interfere with other computer Disadvantages: The cost to set it up so big. Need a lot of cable It should be a lot of I / O ports, each computer is required n-1 I / O port and as many as n (n-1) / 2 connections. For example, there are 4 computers will require a cable connection 4 (4-1) / 2 = 6 cable and requires 4-1 = 3 ports.
  • 18. This is an extension of the topology of a bus topology in which the main cables should be connected to a computer each point using the T- connector. The topology of this
  • 19. Advantages: 1. Simple network 2. Save the cable 3. Easily expandable Disadvantages: 1. Detection of very small mistakes 2. Safety not guaranteed 3. High data traffic 4. The transfer speed depends on the number of users, speed down if the number of users increases That article understanding of a variety of computer network topology , hopefully can provide benefits, greetings