SlideShare a Scribd company logo
1 of 10
Download to read offline
1
1
Network Topologies
• LANs and WANs - Geographical coverage
• LANs
– A single geographical location, such as office building,
school, etc
– Typically High speed and cheaper.
• WANs
– Spans more than one geographical location often
connecting separated LANs
– Slower
– Costly hardware, routers, dedicated leased lines and
complicated implementation procedures.
2
Network Topologies
• Topology - Physical and logical network
layout
– Physical – actual layout of the computer cables
and other network devices
– Logical – the way in which the network appears
to the devices that use it.
• Common topologies:
– Bus, ring, star, mesh and wireless
2
3
Bus topology
• Uses a trunk or backbone to which all of the computers on
the network connect.
• Systems connect to this backbone using T connectors or
taps.
• Coaxial cablings ( 10Base-2, 10Base5) were popular
options years ago.
4
Bus Topology
Difficult to troubleshoot.Does not use any specialized network
equipment.
A break in the cable will prevent all
systems from accessing the network.
Require less cable
Network disruption when computers are
added or removed
Cheap and easy to implement
DisadvantagesAdvantages
3
5
Ring Topology
• Logical ring
– Meaning that data travels in circular fashion
from one computer to another on the network.
– Typically FDDI, SONET or Token Ring
technology are used to implement a ring
network
– Ring networks are most commonly wired in a
star configuration
• Token Ring has multi-station access unit
(MSAU),equivalent to hub or switch. MSAU
performs the token circulation internally.
6
Ring Topology
A single break in the cable can disrupt the
entire network.
Ring networks are moderately easy to
install
Expansion to the network can cause
network disruption
Cable faults are easily located, making
troubleshooting easier
DisadvantagesAdvantages
4
7
Star Topology
• All computers/devices connect to a central
device called hub or switch.
• Each device requires a single cable
• point-to-point connection between the
device and hub.
• Most widely implemented
• Hub is the single point of failure
8
Star Topology
More difficult to implementEasy to troubleshoot and isolate
problems
A central connecting device allows
for a single point of failure
Cable failure affects only a single
user
Requires more cableEasily expanded without disruption
to the network
DisadvantagesAdvantages
5
9
Mesh Topology
• Each computer connects to every other.
• High level of redundancy.
• Rarely used.
– Wiring is very complicated
– Cabling cost is high
– Troubleshooting a failed cable is tricky
– A variation hybrid mesh – create point to point
connection between specific network devices, often
seen in WAN implementation.
10
Mesh Topology
Complicated implementationThe network can be expanded
without disruption to current uses
Requires more cable than the other
LAN topologies
Provides redundant paths between
devices
DisadvantagesAdvantages
6
11
Wireless networking
• Do not require physical cabling
• Particularly useful for remote access for
laptop users
• Eliminate cable faults and cable breaks.
• Signal interference and security issue.
12
Wireless networking
Limited speed in comparison to other
network topologies
Network can be expanded without
disruption to current users
Potential security issues associated with
wireless transmissions
Allows for wireless remote access
DisadvantagesAdvantages
7
13
IEEE and Networking standards
• Institute of Electrical and Electronic
Engineers (IEEE) developed a series of
networking standards
– Networking technologies developed by
manufacturers are Compatible
– Cabling, networking devices and protocols are
all interchangeable under the banner of a
specific IEEE
14
100Mbps technologies, including 100BASEVG-AnyLAN802.12
Wireless networks802.11
Standards for Interoperable LAN/MAN Security (SILS) (Network
Security)
802.10
Integrated Voice and Data Networks802.9
Fiber-Optic Technical Advisory Group802.8
Broadband Technical Advisory Group802.7
Metropolitan Area Network (MAN)802.6
Token Ring networks802.5
A token passing bus802.4
CSMA/CD ( Carrier Sense Multiple Access with Collision
Detection) for Ethernet networks
802.3
The LLC(Logincal Link Control) sublayer802.2
Internetworking802.1
NameSpecification
8
15
802.3 IEEE standard
• Defines characteristics for Ethernet networks.
• New additions,
– 802.3u for Fast Ethernet
– 802.3z for Gigabit Ethernet, referred to as 802.3x.
– … …
– 802.3ac 10gbits/s, expe. 2009
– … …
• Speed: Original 10Mbps, Fast Ethernet 100Mbps, Gigabit Ethernet
1000Mbps
• Topology: bus or star.
• Media: Coaxial and twisted pair cabling, also fiber optic cable.
• Access method: CSMA/CD
16
802.5 IEEE standard
• Specifies the characteristics for Token Ring
Networks.
• Introduced by IBM in the mid 80s, network
topology of choice until the rise of the popularity
of Ethernet.
• Speed: 4 to 16Mbps
• Topology: logical ring and most often a physical
star. Logical ring is often created in the
Multistation Access Unit (MSAU)
• Media: twisted pair cabling.
• Access method: token passing.
9
17
802.11b IEEE Standard - Wireless
• Specifies the characteristics of wireless LAN Ethernet networks.
– Special devices called wireless access points to allow communicate.
– Also connect to wired networks to create wireless portions of entire
networks.
– Access method: Carrier Sense Multiple Access/Collision Avoidance
(CSMA/CA ), a variation of CSMA/CD.
– Topology: physical wireless, logical bus
• Protocol
– 802.11b 1999 2.4GHz, 11Mbits/s
– 802.11g 2003 2.4GHz, 54 Mbits/s
– 802.11n 2008 2.4G,5GHz, 248Mbits/s
– ... …
18
FDDI
• Fiber Distributed Data Interface (FDDI) standard
was developed by American National Standards
Institute (ANSI)
• Dual ring technology for fault tolerance
• Speed: 100Mbps or higher
• Topology: dual ring topology
• Media: fiber optic cable, > 2 kilometers. Also
possible use copper wire as Copper Distributed
Data Interface (CDDI).
• Access method: token-passing access method
10
19
Token
passing
Fiber-optic
Twisted
pair/CDDI
RingDual Ring100MbpsFDDI
CSMA/CARadio wavesBusWireless11Mbps802.11b
Token
passing
Twisted pairRingStar4Mbps and
16Mbps
802.5
CSMA/CDTwisted pairBusStar1000Mbps(802.3z)
CSMA/CDTwisted pairBusStar100Mbps( Fast
Ethernet)
(802.3u)
CSMA/CDCoaxial and
Twisted pair
Bus and Star10Mbps802.3
Access
Method
MediaLogical
Topology
Physical
Topology
SpeedStandard

More Related Content

What's hot

Network topology....sajal
Network topology....sajalNetwork topology....sajal
Network topology....sajalSajal Das
 
Accessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAccessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAbdelkhalik Mosa
 
Network topologies
Network topologiesNetwork topologies
Network topologiesniraj singh
 
Topology presentation
Topology  presentationTopology  presentation
Topology presentationJobaida Nahar
 
topology Final Presentation Fardeen N Qasim
topology Final  Presentation  Fardeen N  Qasimtopology Final  Presentation  Fardeen N  Qasim
topology Final Presentation Fardeen N Qasimguest4bcae0
 
BASIC NETWORKING TOPOLOGIES
BASIC NETWORKING TOPOLOGIESBASIC NETWORKING TOPOLOGIES
BASIC NETWORKING TOPOLOGIESKirti Garg
 
Network topology
Network topologyNetwork topology
Network topologyVpmv
 
Topology Document
Topology DocumentTopology Document
Topology DocumentPratik Vyas
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts reviewPalanivel Kuppusamy
 
Top schools in faridabad
Top schools in faridabadTop schools in faridabad
Top schools in faridabadEdhole.com
 
Networking Chapter 16
Networking Chapter 16Networking Chapter 16
Networking Chapter 16mlrbrown
 

What's hot (17)

Network topology....sajal
Network topology....sajalNetwork topology....sajal
Network topology....sajal
 
Accessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAccessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network Security
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network topology
Network topologyNetwork topology
Network topology
 
Topology presentation
Topology  presentationTopology  presentation
Topology presentation
 
topology Final Presentation Fardeen N Qasim
topology Final  Presentation  Fardeen N  Qasimtopology Final  Presentation  Fardeen N  Qasim
topology Final Presentation Fardeen N Qasim
 
BASIC NETWORKING TOPOLOGIES
BASIC NETWORKING TOPOLOGIESBASIC NETWORKING TOPOLOGIES
BASIC NETWORKING TOPOLOGIES
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Network topology
Network topologyNetwork topology
Network topology
 
Topology Presentation
Topology PresentationTopology Presentation
Topology Presentation
 
Topology Document
Topology DocumentTopology Document
Topology Document
 
Network topology
Network topology Network topology
Network topology
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
 
Hardware3
Hardware3Hardware3
Hardware3
 
Top schools in faridabad
Top schools in faridabadTop schools in faridabad
Top schools in faridabad
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Networking Chapter 16
Networking Chapter 16Networking Chapter 16
Networking Chapter 16
 

Viewers also liked

Sharded Joins for Scalable Incremental Graph Queries
Sharded Joins for Scalable Incremental Graph QueriesSharded Joins for Scalable Incremental Graph Queries
Sharded Joins for Scalable Incremental Graph QueriesGábor Szárnyas
 
Towards a Macrobenchmark Framework for Performance Analysis of Java Applications
Towards a Macrobenchmark Framework for Performance Analysis of Java ApplicationsTowards a Macrobenchmark Framework for Performance Analysis of Java Applications
Towards a Macrobenchmark Framework for Performance Analysis of Java ApplicationsGábor Szárnyas
 
Towards the Characterization of Realistic Models: Evaluation of Multidiscipli...
Towards the Characterization of Realistic Models: Evaluation of Multidiscipli...Towards the Characterization of Realistic Models: Evaluation of Multidiscipli...
Towards the Characterization of Realistic Models: Evaluation of Multidiscipli...Gábor Szárnyas
 
Top 5 seo tools – top 5 seo softwares
Top 5 seo tools – top 5 seo softwaresTop 5 seo tools – top 5 seo softwares
Top 5 seo tools – top 5 seo softwaresief-ajal
 
A process control primer
A process control primerA process control primer
A process control primerPhilani Ngema
 

Viewers also liked (7)

LA
LALA
LA
 
Sharded Joins for Scalable Incremental Graph Queries
Sharded Joins for Scalable Incremental Graph QueriesSharded Joins for Scalable Incremental Graph Queries
Sharded Joins for Scalable Incremental Graph Queries
 
Môn ngữ văn
Môn ngữ vănMôn ngữ văn
Môn ngữ văn
 
Towards a Macrobenchmark Framework for Performance Analysis of Java Applications
Towards a Macrobenchmark Framework for Performance Analysis of Java ApplicationsTowards a Macrobenchmark Framework for Performance Analysis of Java Applications
Towards a Macrobenchmark Framework for Performance Analysis of Java Applications
 
Towards the Characterization of Realistic Models: Evaluation of Multidiscipli...
Towards the Characterization of Realistic Models: Evaluation of Multidiscipli...Towards the Characterization of Realistic Models: Evaluation of Multidiscipli...
Towards the Characterization of Realistic Models: Evaluation of Multidiscipli...
 
Top 5 seo tools – top 5 seo softwares
Top 5 seo tools – top 5 seo softwaresTop 5 seo tools – top 5 seo softwares
Top 5 seo tools – top 5 seo softwares
 
A process control primer
A process control primerA process control primer
A process control primer
 

Similar to Network topologies

NFPhysical Layer.pptx
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptxmmmm11111
 
DITEC - Fundamentals in Networking
DITEC - Fundamentals in NetworkingDITEC - Fundamentals in Networking
DITEC - Fundamentals in NetworkingRasan Samarasinghe
 
DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)Rasan Samarasinghe
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxAASTHAJAJOO
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005SOLOMONCHINAEMEUCHEA
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Aneesh Nelavelly
 
Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to NetworkingMohammed Adam
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkAtika Zaimi
 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18Sagar Walvekar
 
Networking Hardware Concepts
Networking Hardware ConceptsNetworking Hardware Concepts
Networking Hardware ConceptsAmir Villas
 

Similar to Network topologies (20)

Network topologies
Network topologiesNetwork topologies
Network topologies
 
Unit2
Unit2Unit2
Unit2
 
NFPhysical Layer.pptx
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptx
 
RAKESH.pptx
RAKESH.pptxRAKESH.pptx
RAKESH.pptx
 
DITEC - Fundamentals in Networking
DITEC - Fundamentals in NetworkingDITEC - Fundamentals in Networking
DITEC - Fundamentals in Networking
 
DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)
 
Basic networking
Basic networkingBasic networking
Basic networking
 
presentation on type of toplogy and network
presentation on type of toplogy and networkpresentation on type of toplogy and network
presentation on type of toplogy and network
 
Chapter10
Chapter10Chapter10
Chapter10
 
Network design - Topology
Network design  - TopologyNetwork design  - Topology
Network design - Topology
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptx
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1
 
Cct203 lesson 10
Cct203 lesson 10Cct203 lesson 10
Cct203 lesson 10
 
Networks PPT
Networks PPTNetworks PPT
Networks PPT
 
Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to Networking
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18
 
Networking Hardware Concepts
Networking Hardware ConceptsNetworking Hardware Concepts
Networking Hardware Concepts
 

Recently uploaded

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

Network topologies

  • 1. 1 1 Network Topologies • LANs and WANs - Geographical coverage • LANs – A single geographical location, such as office building, school, etc – Typically High speed and cheaper. • WANs – Spans more than one geographical location often connecting separated LANs – Slower – Costly hardware, routers, dedicated leased lines and complicated implementation procedures. 2 Network Topologies • Topology - Physical and logical network layout – Physical – actual layout of the computer cables and other network devices – Logical – the way in which the network appears to the devices that use it. • Common topologies: – Bus, ring, star, mesh and wireless
  • 2. 2 3 Bus topology • Uses a trunk or backbone to which all of the computers on the network connect. • Systems connect to this backbone using T connectors or taps. • Coaxial cablings ( 10Base-2, 10Base5) were popular options years ago. 4 Bus Topology Difficult to troubleshoot.Does not use any specialized network equipment. A break in the cable will prevent all systems from accessing the network. Require less cable Network disruption when computers are added or removed Cheap and easy to implement DisadvantagesAdvantages
  • 3. 3 5 Ring Topology • Logical ring – Meaning that data travels in circular fashion from one computer to another on the network. – Typically FDDI, SONET or Token Ring technology are used to implement a ring network – Ring networks are most commonly wired in a star configuration • Token Ring has multi-station access unit (MSAU),equivalent to hub or switch. MSAU performs the token circulation internally. 6 Ring Topology A single break in the cable can disrupt the entire network. Ring networks are moderately easy to install Expansion to the network can cause network disruption Cable faults are easily located, making troubleshooting easier DisadvantagesAdvantages
  • 4. 4 7 Star Topology • All computers/devices connect to a central device called hub or switch. • Each device requires a single cable • point-to-point connection between the device and hub. • Most widely implemented • Hub is the single point of failure 8 Star Topology More difficult to implementEasy to troubleshoot and isolate problems A central connecting device allows for a single point of failure Cable failure affects only a single user Requires more cableEasily expanded without disruption to the network DisadvantagesAdvantages
  • 5. 5 9 Mesh Topology • Each computer connects to every other. • High level of redundancy. • Rarely used. – Wiring is very complicated – Cabling cost is high – Troubleshooting a failed cable is tricky – A variation hybrid mesh – create point to point connection between specific network devices, often seen in WAN implementation. 10 Mesh Topology Complicated implementationThe network can be expanded without disruption to current uses Requires more cable than the other LAN topologies Provides redundant paths between devices DisadvantagesAdvantages
  • 6. 6 11 Wireless networking • Do not require physical cabling • Particularly useful for remote access for laptop users • Eliminate cable faults and cable breaks. • Signal interference and security issue. 12 Wireless networking Limited speed in comparison to other network topologies Network can be expanded without disruption to current users Potential security issues associated with wireless transmissions Allows for wireless remote access DisadvantagesAdvantages
  • 7. 7 13 IEEE and Networking standards • Institute of Electrical and Electronic Engineers (IEEE) developed a series of networking standards – Networking technologies developed by manufacturers are Compatible – Cabling, networking devices and protocols are all interchangeable under the banner of a specific IEEE 14 100Mbps technologies, including 100BASEVG-AnyLAN802.12 Wireless networks802.11 Standards for Interoperable LAN/MAN Security (SILS) (Network Security) 802.10 Integrated Voice and Data Networks802.9 Fiber-Optic Technical Advisory Group802.8 Broadband Technical Advisory Group802.7 Metropolitan Area Network (MAN)802.6 Token Ring networks802.5 A token passing bus802.4 CSMA/CD ( Carrier Sense Multiple Access with Collision Detection) for Ethernet networks 802.3 The LLC(Logincal Link Control) sublayer802.2 Internetworking802.1 NameSpecification
  • 8. 8 15 802.3 IEEE standard • Defines characteristics for Ethernet networks. • New additions, – 802.3u for Fast Ethernet – 802.3z for Gigabit Ethernet, referred to as 802.3x. – … … – 802.3ac 10gbits/s, expe. 2009 – … … • Speed: Original 10Mbps, Fast Ethernet 100Mbps, Gigabit Ethernet 1000Mbps • Topology: bus or star. • Media: Coaxial and twisted pair cabling, also fiber optic cable. • Access method: CSMA/CD 16 802.5 IEEE standard • Specifies the characteristics for Token Ring Networks. • Introduced by IBM in the mid 80s, network topology of choice until the rise of the popularity of Ethernet. • Speed: 4 to 16Mbps • Topology: logical ring and most often a physical star. Logical ring is often created in the Multistation Access Unit (MSAU) • Media: twisted pair cabling. • Access method: token passing.
  • 9. 9 17 802.11b IEEE Standard - Wireless • Specifies the characteristics of wireless LAN Ethernet networks. – Special devices called wireless access points to allow communicate. – Also connect to wired networks to create wireless portions of entire networks. – Access method: Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA ), a variation of CSMA/CD. – Topology: physical wireless, logical bus • Protocol – 802.11b 1999 2.4GHz, 11Mbits/s – 802.11g 2003 2.4GHz, 54 Mbits/s – 802.11n 2008 2.4G,5GHz, 248Mbits/s – ... … 18 FDDI • Fiber Distributed Data Interface (FDDI) standard was developed by American National Standards Institute (ANSI) • Dual ring technology for fault tolerance • Speed: 100Mbps or higher • Topology: dual ring topology • Media: fiber optic cable, > 2 kilometers. Also possible use copper wire as Copper Distributed Data Interface (CDDI). • Access method: token-passing access method
  • 10. 10 19 Token passing Fiber-optic Twisted pair/CDDI RingDual Ring100MbpsFDDI CSMA/CARadio wavesBusWireless11Mbps802.11b Token passing Twisted pairRingStar4Mbps and 16Mbps 802.5 CSMA/CDTwisted pairBusStar1000Mbps(802.3z) CSMA/CDTwisted pairBusStar100Mbps( Fast Ethernet) (802.3u) CSMA/CDCoaxial and Twisted pair Bus and Star10Mbps802.3 Access Method MediaLogical Topology Physical Topology SpeedStandard