SlideShare a Scribd company logo
1 of 35
Network topology
Topology
• Topology refers to the layout of connected
devices on a network.
• Here, some logical layout of topology.
oMesh
oStar
oBus
oRing
oTree and Hybrid
Network Topology
Mesh Topology
• Here every device has a point to point link to
every other device.
• Node 1 node must be connected with n-1
nodes.
• A fully connected mesh can have n(n-1)/2
physical channels to link n devices.
• It must have n-1 I/O ports.
Mesh Topology
Advantages:
1. They use dedicated links so each link can only
carry its own data load. So traffic problem can be
avoided.
2. It is robust. If any one link get damaged it cannot
affect others.
3. It gives privacy and security.(Message travels
along a dedicated link)
4. Fault identification and fault isolation are easy.
Mesh Topology
Mesh Topology
Mesh Topology
• Disadvantages:
1. The amount of cabling and the number of I/O ports
required are very large. Since every device is
connected to each devices through dedicated links.
2. The sheer bulk of wiring is larger then the available
space.
3. Hardware required to connected each device is
highly expensive.
Mesh Topology
• Applications:
1. Telephone Regional office.
2. WAN.(Wide Area Network).
Star Topology
• Here each device has a dedicated point-to-point link
to the central controller called “Hub”(Act as a
Exchange).
• There is no direct traffic between devices.
• The transmission are occurred only through the
central “hub”.
• When device 1 wants to send data to device 2; First
sends the data to hub. Which then relays the data to
the other connected device.
Star Topology
Star Topology
Star Topology
• Advantages:
1. Less expensive then mesh since each device is
connected only to the hub.
2. Installation and configuration are easy.
3. Less cabling is need then mesh.
4. Robustness.(if one link fails, only that links is
affected. All other links remain active)
5. Easy to fault identification & to remove parts.
6. No distruptions to the network then connecting(or)
removing devices.
Star Topology
• Disadvantages:
1. Even it requires less cabling then mesh when
compared with other topologies it still large.(Ring or
bus).
2. Dependency(whole n/w dependent on one single
point(hub). When it goes down. The whole system is
dead.
Applications
• Star topology used in Local Area Networks(LANs).
• High speed LAN often used STAR.
Bus Topology
• A bus topology is multipoint.
• Here one long cable act as a backbone to link all the
devices are connected to the backbone by drop lines
and taps.
• Drop line- is the connection b/w the devices and the
cable.
• Tap- is the splitter that cut the main link.
• This allows only one device to transmit at a time.
Bus Topology
Bus Topology
Bus Topology
Bus Topology
Bus Topology
• A device want to communicate with other device on
the n/ws sends a broadcast message onto the wire all
other devices see.
• But only the intended devices accepts and process the
message.
Bus Topology
• Advantages:
1. Ease of installation
2. Less cabling
Disadvantages:
1. Difficult reconfiguration and fault isolation.
2. Difficult to add new devices.
3. Signal reflection at top can degradation in quality.
4. If any fault in backbone can stops all transmission.
Bus Topology
• Applications:
• Most computer motherboard.
Ring Topology
• Here each device has a dedicated connection with two
devices on either side.
• The signal is passed in one direction from device to
device until it reaches the destination and each device
have repeater.
• When one device received signals instead of intended
another device, its repeater then regenerates the data
and passes them along.
• To add or delete a device requires changing only two
connections.
Ring Topology
Ring Topology
Ring Topology
Ring Topology
• Advantages:
1. Easy to install.
2. Easy to reconfigure.
3. Fault identification is easy.
Disadvantages:
1. Unidirectional traffic.
2. Break in a single ring can break entire network.
Ring Topology
• Applications:
• Ring topologies are found in some office buildings or
school campuses.
• Today high speed LANs made this topology less
popular.
Tree Topology
• Alternatively referred to as a star bus topology.
• Tree topology is one of the most common network
setups that is similar to a bus topology and a star
topology.
• A tree topology connects multiple star networks to
other star networks. Below is a visual example of a
simple computer setup on a network using the star
topology.
Tree Topology
Hybrid Topology
• A network which contain all type of physical
structure and connected under a single backbone
channel.
Hybrid Topology
• a
Considerations for
choosing topology
• Money-Bus n/w may be the least expensive way to
install a n/w.
• Length-of cable needed- the linear bus n/w uses
shorter lengths of cable.
• Future growth-with star topology, expending a n/w is
easily done by adding another devices.
• Cable type-most common used cable in commercial
organization is twisted pair. Which often
used with star topologies.
• Full mesh topology is theoretically the best since
every device is connected to every other device.(thus
maximizing speed and security. however, it quite
expensive to install)
• Next best would be tree topology, which is basically a
connection of star.

More Related Content

What's hot

Presentation on data communication
Presentation on data communicationPresentation on data communication
Presentation on data communicationHarpreet Dhaliwal
 
Transmission Modes in Computer Networks
Transmission Modes in Computer Networks Transmission Modes in Computer Networks
Transmission Modes in Computer Networks AL- AMIN
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkAshita Agrawal
 
Computer Networks - PPT
Computer Networks - PPTComputer Networks - PPT
Computer Networks - PPTDhivya T
 
LAN , MAN , WAN introduction
LAN , MAN , WAN introductionLAN , MAN , WAN introduction
LAN , MAN , WAN introductionbhavna sahajwani
 
Lan, man and wan ppt final
Lan, man and wan ppt finalLan, man and wan ppt final
Lan, man and wan ppt finalArushi Garg
 
Computer network ppt communication
Computer network ppt communicationComputer network ppt communication
Computer network ppt communicationKajal Sharma
 
Network topologies
Network topologiesNetwork topologies
Network topologiesNorah Saad
 
Operating system presentation
Operating system presentationOperating system presentation
Operating system presentationashanrajpar
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)ashiesh0007
 
Data communication
Data communicationData communication
Data communicationBurhan Ahmed
 
Presentation on computer networking
Presentation on computer networkingPresentation on computer networking
Presentation on computer networkingJyoti Tewari
 

What's hot (20)

Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Presentation on data communication
Presentation on data communicationPresentation on data communication
Presentation on data communication
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Transmission Modes in Computer Networks
Transmission Modes in Computer Networks Transmission Modes in Computer Networks
Transmission Modes in Computer Networks
 
Ppt of types of-network
Ppt of types of-network Ppt of types of-network
Ppt of types of-network
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Computer Networks - PPT
Computer Networks - PPTComputer Networks - PPT
Computer Networks - PPT
 
LAN , MAN , WAN introduction
LAN , MAN , WAN introductionLAN , MAN , WAN introduction
LAN , MAN , WAN introduction
 
Lan, man and wan ppt final
Lan, man and wan ppt finalLan, man and wan ppt final
Lan, man and wan ppt final
 
Computer network ppt communication
Computer network ppt communicationComputer network ppt communication
Computer network ppt communication
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Operating system presentation
Operating system presentationOperating system presentation
Operating system presentation
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Data communication
Data communicationData communication
Data communication
 
Osi model
Osi modelOsi model
Osi model
 
Presentation on computer networking
Presentation on computer networkingPresentation on computer networking
Presentation on computer networking
 
Data communication & networks
Data communication & networksData communication & networks
Data communication & networks
 
Lan and wan
Lan and wanLan and wan
Lan and wan
 

Viewers also liked

Topology presentation
Topology  presentationTopology  presentation
Topology presentationJobaida Nahar
 
Presentation on topology
Presentation on topologyPresentation on topology
Presentation on topologykalyan kumar
 
Topology presentation-sachin noire
Topology presentation-sachin noireTopology presentation-sachin noire
Topology presentation-sachin noiresachin kumar
 
Crimping and Testing
Crimping and TestingCrimping and Testing
Crimping and TestingSean Chia
 
Network cable
Network cableNetwork cable
Network cableOnline
 
Kohesyong gramatikal at uri ng pang abay
Kohesyong gramatikal at uri ng pang abayKohesyong gramatikal at uri ng pang abay
Kohesyong gramatikal at uri ng pang abayCharlene Diane Reyes
 
Network cable
Network cableNetwork cable
Network cableFrya Lora
 
Data models in geographical information system(GIS)
Data models in geographical information system(GIS)Data models in geographical information system(GIS)
Data models in geographical information system(GIS)Pramoda Raj
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection NetworkAli A Jalil
 
Spatial vs non spatial
Spatial vs non spatialSpatial vs non spatial
Spatial vs non spatialSumant Diwakar
 
Rastar Capabilities
Rastar CapabilitiesRastar Capabilities
Rastar Capabilitiesbsattree
 
Tours les jours2
Tours les jours2Tours les jours2
Tours les jours2chanpinqi
 
Chemical bonding
Chemical bondingChemical bonding
Chemical bondingPramoda Raj
 
datamodel_vector
datamodel_vectordatamodel_vector
datamodel_vectorRiya Gupta
 
raster data model
raster data modelraster data model
raster data modelRiya Gupta
 

Viewers also liked (20)

Topology presentation
Topology  presentationTopology  presentation
Topology presentation
 
Presentation on topology
Presentation on topologyPresentation on topology
Presentation on topology
 
Topology presentation-sachin noire
Topology presentation-sachin noireTopology presentation-sachin noire
Topology presentation-sachin noire
 
Network design - Topology
Network design  - TopologyNetwork design  - Topology
Network design - Topology
 
Crimping and Testing
Crimping and TestingCrimping and Testing
Crimping and Testing
 
Network cable
Network cableNetwork cable
Network cable
 
Kohesyong gramatikal at uri ng pang abay
Kohesyong gramatikal at uri ng pang abayKohesyong gramatikal at uri ng pang abay
Kohesyong gramatikal at uri ng pang abay
 
Network cable
Network cableNetwork cable
Network cable
 
Topology in GIS
Topology in GISTopology in GIS
Topology in GIS
 
Data models in geographical information system(GIS)
Data models in geographical information system(GIS)Data models in geographical information system(GIS)
Data models in geographical information system(GIS)
 
GIS Data Types
GIS Data TypesGIS Data Types
GIS Data Types
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection Network
 
Spatial vs non spatial
Spatial vs non spatialSpatial vs non spatial
Spatial vs non spatial
 
Raster data model
Raster data modelRaster data model
Raster data model
 
Rastar Capabilities
Rastar CapabilitiesRastar Capabilities
Rastar Capabilities
 
Tours les jours2
Tours les jours2Tours les jours2
Tours les jours2
 
Chemical bonding
Chemical bondingChemical bonding
Chemical bonding
 
datamodel_vector
datamodel_vectordatamodel_vector
datamodel_vector
 
Bb geodatabase
Bb geodatabaseBb geodatabase
Bb geodatabase
 
raster data model
raster data modelraster data model
raster data model
 

Similar to Network topology.ppt

network topology _computer networks.pptx
network  topology _computer networks.pptxnetwork  topology _computer networks.pptx
network topology _computer networks.pptxManimegalaM3
 
Network topology
Network topologyNetwork topology
Network topologyAnindyaNag5
 
lecture 2,3.pdf
lecture 2,3.pdflecture 2,3.pdf
lecture 2,3.pdfuseless45
 
networktopology-final.pptx
networktopology-final.pptxnetworktopology-final.pptx
networktopology-final.pptxBhuvanaR13
 
Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01Sayyed Nawaz
 
Network topology ? Types of Network Toplogies:Bus, Ring, Mesh, Tree, Star, Hy...
Network topology ? Types of Network Toplogies:Bus, Ring, Mesh, Tree, Star, Hy...Network topology ? Types of Network Toplogies:Bus, Ring, Mesh, Tree, Star, Hy...
Network topology ? Types of Network Toplogies:Bus, Ring, Mesh, Tree, Star, Hy...Surinder K. Mourya
 
05 network typologies
05 network typologies05 network typologies
05 network typologiesJadavsejal
 
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxSuratSingh18
 
Network topology
Network topologyNetwork topology
Network topologyStudent
 
sp...mads
sp...madssp...mads
sp...madspgj17
 
3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2JAIGANESH SEKAR
 

Similar to Network topology.ppt (20)

Network topologies
Network topologiesNetwork topologies
Network topologies
 
network topology _computer networks.pptx
network  topology _computer networks.pptxnetwork  topology _computer networks.pptx
network topology _computer networks.pptx
 
Networktopology
NetworktopologyNetworktopology
Networktopology
 
Network topology
Network topologyNetwork topology
Network topology
 
lecture 2,3.pdf
lecture 2,3.pdflecture 2,3.pdf
lecture 2,3.pdf
 
networktopology-final.pptx
networktopology-final.pptxnetworktopology-final.pptx
networktopology-final.pptx
 
Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01
 
Network topology
Network topologyNetwork topology
Network topology
 
Network topology ? Types of Network Toplogies:Bus, Ring, Mesh, Tree, Star, Hy...
Network topology ? Types of Network Toplogies:Bus, Ring, Mesh, Tree, Star, Hy...Network topology ? Types of Network Toplogies:Bus, Ring, Mesh, Tree, Star, Hy...
Network topology ? Types of Network Toplogies:Bus, Ring, Mesh, Tree, Star, Hy...
 
05 network typologies
05 network typologies05 network typologies
05 network typologies
 
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
 
Network topology
Network topologyNetwork topology
Network topology
 
Topology
TopologyTopology
Topology
 
Topology
TopologyTopology
Topology
 
sp...mads
sp...madssp...mads
sp...mads
 
3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2
 
Presentation2-2.pptx
Presentation2-2.pptxPresentation2-2.pptx
Presentation2-2.pptx
 
report.pptx
report.pptxreport.pptx
report.pptx
 
Topology.pptx
Topology.pptxTopology.pptx
Topology.pptx
 
Topology
Topology Topology
Topology
 

More from Siddique Ibrahim (20)

List in Python
List in PythonList in Python
List in Python
 
Python Control structures
Python Control structuresPython Control structures
Python Control structures
 
Python programming introduction
Python programming introductionPython programming introduction
Python programming introduction
 
Data mining basic fundamentals
Data mining basic fundamentalsData mining basic fundamentals
Data mining basic fundamentals
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Virtualization Concepts
Virtualization ConceptsVirtualization Concepts
Virtualization Concepts
 
Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
 
Mysql grand
Mysql grandMysql grand
Mysql grand
 
Getting started into mySQL
Getting started into mySQLGetting started into mySQL
Getting started into mySQL
 
pipelining
pipeliningpipelining
pipelining
 
Micro programmed control
Micro programmed controlMicro programmed control
Micro programmed control
 
Hardwired control
Hardwired controlHardwired control
Hardwired control
 
interface
interfaceinterface
interface
 
Interrupt
InterruptInterrupt
Interrupt
 
Interrupt
InterruptInterrupt
Interrupt
 
DMA
DMADMA
DMA
 
Io devies
Io deviesIo devies
Io devies
 
Stack & queue
Stack & queueStack & queue
Stack & queue
 
Metadata in data warehouse
Metadata in data warehouseMetadata in data warehouse
Metadata in data warehouse
 

Recently uploaded

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

Network topology.ppt

  • 2. Topology • Topology refers to the layout of connected devices on a network. • Here, some logical layout of topology. oMesh oStar oBus oRing oTree and Hybrid
  • 4. Mesh Topology • Here every device has a point to point link to every other device. • Node 1 node must be connected with n-1 nodes. • A fully connected mesh can have n(n-1)/2 physical channels to link n devices. • It must have n-1 I/O ports.
  • 5. Mesh Topology Advantages: 1. They use dedicated links so each link can only carry its own data load. So traffic problem can be avoided. 2. It is robust. If any one link get damaged it cannot affect others. 3. It gives privacy and security.(Message travels along a dedicated link) 4. Fault identification and fault isolation are easy.
  • 8. Mesh Topology • Disadvantages: 1. The amount of cabling and the number of I/O ports required are very large. Since every device is connected to each devices through dedicated links. 2. The sheer bulk of wiring is larger then the available space. 3. Hardware required to connected each device is highly expensive.
  • 9. Mesh Topology • Applications: 1. Telephone Regional office. 2. WAN.(Wide Area Network).
  • 10. Star Topology • Here each device has a dedicated point-to-point link to the central controller called “Hub”(Act as a Exchange). • There is no direct traffic between devices. • The transmission are occurred only through the central “hub”. • When device 1 wants to send data to device 2; First sends the data to hub. Which then relays the data to the other connected device.
  • 13. Star Topology • Advantages: 1. Less expensive then mesh since each device is connected only to the hub. 2. Installation and configuration are easy. 3. Less cabling is need then mesh. 4. Robustness.(if one link fails, only that links is affected. All other links remain active) 5. Easy to fault identification & to remove parts. 6. No distruptions to the network then connecting(or) removing devices.
  • 14. Star Topology • Disadvantages: 1. Even it requires less cabling then mesh when compared with other topologies it still large.(Ring or bus). 2. Dependency(whole n/w dependent on one single point(hub). When it goes down. The whole system is dead.
  • 15. Applications • Star topology used in Local Area Networks(LANs). • High speed LAN often used STAR.
  • 16. Bus Topology • A bus topology is multipoint. • Here one long cable act as a backbone to link all the devices are connected to the backbone by drop lines and taps. • Drop line- is the connection b/w the devices and the cable. • Tap- is the splitter that cut the main link. • This allows only one device to transmit at a time.
  • 21. Bus Topology • A device want to communicate with other device on the n/ws sends a broadcast message onto the wire all other devices see. • But only the intended devices accepts and process the message.
  • 22. Bus Topology • Advantages: 1. Ease of installation 2. Less cabling Disadvantages: 1. Difficult reconfiguration and fault isolation. 2. Difficult to add new devices. 3. Signal reflection at top can degradation in quality. 4. If any fault in backbone can stops all transmission.
  • 23. Bus Topology • Applications: • Most computer motherboard.
  • 24. Ring Topology • Here each device has a dedicated connection with two devices on either side. • The signal is passed in one direction from device to device until it reaches the destination and each device have repeater. • When one device received signals instead of intended another device, its repeater then regenerates the data and passes them along. • To add or delete a device requires changing only two connections.
  • 28. Ring Topology • Advantages: 1. Easy to install. 2. Easy to reconfigure. 3. Fault identification is easy. Disadvantages: 1. Unidirectional traffic. 2. Break in a single ring can break entire network.
  • 29. Ring Topology • Applications: • Ring topologies are found in some office buildings or school campuses. • Today high speed LANs made this topology less popular.
  • 30. Tree Topology • Alternatively referred to as a star bus topology. • Tree topology is one of the most common network setups that is similar to a bus topology and a star topology. • A tree topology connects multiple star networks to other star networks. Below is a visual example of a simple computer setup on a network using the star topology.
  • 32. Hybrid Topology • A network which contain all type of physical structure and connected under a single backbone channel.
  • 34. Considerations for choosing topology • Money-Bus n/w may be the least expensive way to install a n/w. • Length-of cable needed- the linear bus n/w uses shorter lengths of cable. • Future growth-with star topology, expending a n/w is easily done by adding another devices. • Cable type-most common used cable in commercial organization is twisted pair. Which often used with star topologies.
  • 35. • Full mesh topology is theoretically the best since every device is connected to every other device.(thus maximizing speed and security. however, it quite expensive to install) • Next best would be tree topology, which is basically a connection of star.