SlideShare une entreprise Scribd logo
1  sur  24
There are three basic configurations used to connect
computers they are the
Bus
Ring
Star
NETWORKING &
TOPOLOGIES
Bus topology

This type of network was widely used in the
1980’s
 In this configuration every computer (node)
shares the networks total bus capacities.
 In this configuration adding more computers will
reduce the access speed on the network.
 Each computer communicates to other computers
on the network independently this is referred to as
PEER-TO-PEER networking

How a Bus Peer to Peer
Network Works
All computers on a network have a
distinct address just like your house
does
 a message would be send from one
computer with the address of another
computer attached to the message
 The message is broadcasted to all the
computers on the network until the
addressed PC accepts the message

Problems


One of the main problems with this type
of network is that it is not very fault
tolerant, a break or defect in the bus
would affect the whole network
Ring Topology
In Ring topology each node is connected to the
two nearest nodes so the entire network forms
a circle
 Data only travels in one direction on a Ring
network

How this Topology works
a node has information to send to another
computer on the network so it sends the
information out on the network to the PC it
is connected to, if the information is for this
PC (the recipients NIC address is attached
to the message, which is like putting an
address on an envelope) then the PC
accepts the data
 otherwise it passes the information on to
the next PC by repeating the data back out
on the line
 This method of repeating the data helps
keep the integrity of the data readable by
other computers

How it Works
As it is better to have computers take
turns using the connecting Data cable,
Ring topologies incorporated a system
called Token passing
 In this topology, to transmit on the wire
your computer must have control of the
token or wait for the token to be free
 Larger Token Ring networks use
multiple tokens

Problems and Solutions







The drawback to this type of topology is that a
single malfunctioning workstation can disable the
whole network
To make sure all the information is sent the
receiving PC sends the token back to the sending
PC after it has received all the data
If the sending PC is finished sending it passes the
token to the next PC
This type of network was also widely used in the
1980’s
This type of network used Thinnet cable joining
nodes.
In the mid 1980’s Thinnet cable was replaced by
Category 3 Ethernet cable capable of handling up
to 10Mbps
Star topology
HUB

In a Star topology every node is connected
through a central device such as a Hub, Switch
or Router
 Compared to a Ring or Bus topology a Star
topology requires that more thought be put into
its setup

The Good and Bad of a
Star Network
The upside of a star network is that if
any one cable fails then only the node
connected on that cable would be
affected
 Another positive point to this type of
network is that it is very simple to join
two star networks together by
connecting their central devices to each
other

The Good and Bad of a
Star Network
As each computer is connected to a
central device (Hub) the location of the
Hub must be made as central as
possible, so as to reduce cable lengths
 The drawback to this type of topology is
if a central device was to fail then all
computers connected to that device
would not be able to see the network

What is a Hub?
A hub is usually a small rectangular box,
often made of plastic, which receives its
power from an ordinary wall outlet
 A hub joins multiple computers (or other
network devices) together to form a
single network segment
 On this network segment, all computers
can communicate directly with each
other

What is a Hub?
Ethernet hubs are by far the most
common type, but hubs for other types
of networks such as USB also exist
 A hub includes a series of ports that
each accepts a network cable
 Small hubs can network four computers
together
 They contain four or sometimes five
ports

What is a Hub?
Many times the fifth port is reserved for
"uplink" which is the connecting of one
hub to another hub or similar device
(joining two segments together).
 Larger hubs contain eight, 12, 16, and
even 24 ports

Key Features of Hubs
Hubs classify as Layer 1 devices in the OSI
model
 OSI stands for :
The Open Systems Interconnection Basic
Reference Model
 At the physical layer, hubs can support little
in the way of sophisticated networking
 Hubs do not read any of the data passing
through them and are not aware of their
source or destination

Key Features of Hubs
Essentially, a hub simply receives
incoming packets, possibly amplifies the
electrical signal, and broadcasts these
packets out to all devices on the network
- including the one that originally sent
the packet!
 a packet is a formatted block of data
carried by a computer network

Different Types of Hubs


Technically speaking, three different
types of hubs exist
Passive
Active
Intelligent
Passive hubs
 Passive hubs do not amplify the electrical
signal of incoming packets before broadcasting
them out to the network
Active hubs


amplify the electrical signal of incoming
packets back to their original level before
broadcasting them back out on the network
What is a Network Switch?
A network switch is a small hardware
device that joins multiple computers
together within one local area network
(LAN)
 Technically, network switches operate at
layer two (Data Link Layer) of the OSI
model

What is a Router?
Routers are physical devices that join
multiple wired or wireless networks
together
 Technically, a wired or wireless router is
a Layer 3 gateway, meaning that the
wired/wireless router connects networks
together
 A Gateway is a device that acts like a
security guard and only allows data in or
out if it has the right network headers

Routers
Home “networkers” often use an Internet
Protocol (IP) wired or wireless router
 IP is the most common OSI network layer
protocol
 Protocols are the rules governing the
transfer of data information, it can also be
compared to how humans use languages
(to get your point across you must talk in
the same language as the person you are
speaking to).

Routers
An IP router such as a DSL or cable
modem are broadband routers and joins
the home's local area network (LAN) to
the wide-area network (WAN) of the
Internet
 A Broadband Router is a device that
allows multiple PC’s to access the
Internet using only one address.

Network topologies for management

Contenu connexe

Tendances

Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkRutwik Jadhav
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12LakshyaT
 
Basic Networking Concepts
Basic Networking ConceptsBasic Networking Concepts
Basic Networking ConceptsSehajbir Singh
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application pptNitesh Dubey
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devicesKunal Bhansali
 
20372748 case-study-on-computer-networking-kotak-mahindra-bank
20372748 case-study-on-computer-networking-kotak-mahindra-bank20372748 case-study-on-computer-networking-kotak-mahindra-bank
20372748 case-study-on-computer-networking-kotak-mahindra-bankShivani Joshi
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingRozitarmizi Mohammad
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologiesAyush0734
 
Dc lec-03 (topologies)
Dc lec-03  (topologies)Dc lec-03  (topologies)
Dc lec-03 (topologies)diaryinc
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic conceptsrahul kapoliya
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.mvenkat2016
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologiesdbrown1
 
Network topologies
Network topologiesNetwork topologies
Network topologiespris21
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKINGKiran Buriro
 

Tendances (20)

Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 
Unit2
Unit2Unit2
Unit2
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
NETWORKING
NETWORKINGNETWORKING
NETWORKING
 
Basic Networking Concepts
Basic Networking ConceptsBasic Networking Concepts
Basic Networking Concepts
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application ppt
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devices
 
20372748 case-study-on-computer-networking-kotak-mahindra-bank
20372748 case-study-on-computer-networking-kotak-mahindra-bank20372748 case-study-on-computer-networking-kotak-mahindra-bank
20372748 case-study-on-computer-networking-kotak-mahindra-bank
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologies
 
Dc lec-03 (topologies)
Dc lec-03  (topologies)Dc lec-03  (topologies)
Dc lec-03 (topologies)
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Computer network
Computer networkComputer network
Computer network
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 

En vedette (10)

Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
IGRP and EIGRP
IGRP and EIGRPIGRP and EIGRP
IGRP and EIGRP
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Igrp
IgrpIgrp
Igrp
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
BGP Overview
BGP OverviewBGP Overview
BGP Overview
 
BGP
BGPBGP
BGP
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
 
OSPF Basics
OSPF BasicsOSPF Basics
OSPF Basics
 

Similaire à Network topologies for management

Network Topology and its types
Network Topology and its typesNetwork Topology and its types
Network Topology and its typesMadhuri Badgujar
 
For Introduction to Network1.What is computer networking means2.pdf
For Introduction to Network1.What is computer networking means2.pdfFor Introduction to Network1.What is computer networking means2.pdf
For Introduction to Network1.What is computer networking means2.pdffippsximenaal85949
 
1414407496.309801 network topologies (1)
1414407496.309801 network topologies (1)1414407496.309801 network topologies (1)
1414407496.309801 network topologies (1)hina mujahid
 
1414407496.309801 network topologies
1414407496.309801 network topologies1414407496.309801 network topologies
1414407496.309801 network topologieskaran saini
 
1414407496.309801 network topologies
1414407496.309801 network topologies1414407496.309801 network topologies
1414407496.309801 network topologiesboocse11
 
basiccomponentsofacomputernetwork-210820131631.pptx
basiccomponentsofacomputernetwork-210820131631.pptxbasiccomponentsofacomputernetwork-210820131631.pptx
basiccomponentsofacomputernetwork-210820131631.pptx14941
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnologyGulrez Khan
 
Networking hard copy (1)
Networking  hard copy (1)Networking  hard copy (1)
Networking hard copy (1)Ankita Shetty
 
Grade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptxGrade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptxCatherineBotardo3
 
Concept of Networking and Operating System.
Concept of Networking and Operating System.Concept of Networking and Operating System.
Concept of Networking and Operating System.AnshulAnand21
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devicesNumaan Tole
 
Computer Networks By Beant Singh Duggal
Computer Networks By Beant Singh DuggalComputer Networks By Beant Singh Duggal
Computer Networks By Beant Singh DuggalBeantsingh
 
Network ppt
Network pptNetwork ppt
Network ppthlalu861
 

Similaire à Network topologies for management (20)

Network Topology and its types
Network Topology and its typesNetwork Topology and its types
Network Topology and its types
 
For Introduction to Network1.What is computer networking means2.pdf
For Introduction to Network1.What is computer networking means2.pdfFor Introduction to Network1.What is computer networking means2.pdf
For Introduction to Network1.What is computer networking means2.pdf
 
1414407496.309801 network topologies (1)
1414407496.309801 network topologies (1)1414407496.309801 network topologies (1)
1414407496.309801 network topologies (1)
 
1414407496.309801 network topologies
1414407496.309801 network topologies1414407496.309801 network topologies
1414407496.309801 network topologies
 
1414407496.309801 network topologies
1414407496.309801 network topologies1414407496.309801 network topologies
1414407496.309801 network topologies
 
01 network topologies
01 network topologies01 network topologies
01 network topologies
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
basiccomponentsofacomputernetwork-210820131631.pptx
basiccomponentsofacomputernetwork-210820131631.pptxbasiccomponentsofacomputernetwork-210820131631.pptx
basiccomponentsofacomputernetwork-210820131631.pptx
 
Networking
NetworkingNetworking
Networking
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnology
 
Networking hard copy (1)
Networking  hard copy (1)Networking  hard copy (1)
Networking hard copy (1)
 
Grade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptxGrade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptx
 
Computer networks--networking
Computer networks--networkingComputer networks--networking
Computer networks--networking
 
Concept of Networking and Operating System.
Concept of Networking and Operating System.Concept of Networking and Operating System.
Concept of Networking and Operating System.
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devices
 
Computer Networks By Beant Singh Duggal
Computer Networks By Beant Singh DuggalComputer Networks By Beant Singh Duggal
Computer Networks By Beant Singh Duggal
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
networking
networkingnetworking
networking
 
Com
ComCom
Com
 
Network ppt
Network pptNetwork ppt
Network ppt
 

Plus de Saugata Palit

Sports and mental health
Sports and mental healthSports and mental health
Sports and mental healthSaugata Palit
 
How handwriting communicates
How handwriting communicatesHow handwriting communicates
How handwriting communicatesSaugata Palit
 
Customers Expectation of a Service
Customers Expectation of a ServiceCustomers Expectation of a Service
Customers Expectation of a ServiceSaugata Palit
 
Pepsico Sales Structure
Pepsico Sales StructurePepsico Sales Structure
Pepsico Sales StructureSaugata Palit
 
Vision and Mission statements
Vision and Mission statementsVision and Mission statements
Vision and Mission statementsSaugata Palit
 
Parental Gatekeeping in Diasporic familes
Parental Gatekeeping in Diasporic familesParental Gatekeeping in Diasporic familes
Parental Gatekeeping in Diasporic familesSaugata Palit
 
E commerce and supply chain management
E commerce and supply chain managementE commerce and supply chain management
E commerce and supply chain managementSaugata Palit
 
Vision & Mission of Coke , PWC , Flipkart , Caterpillar
Vision & Mission of Coke , PWC , Flipkart , Caterpillar Vision & Mission of Coke , PWC , Flipkart , Caterpillar
Vision & Mission of Coke , PWC , Flipkart , Caterpillar Saugata Palit
 
Competitive analysis of jabong and myntra
Competitive analysis of jabong and myntraCompetitive analysis of jabong and myntra
Competitive analysis of jabong and myntraSaugata Palit
 
Manufacturing process of a random company
Manufacturing process of a random companyManufacturing process of a random company
Manufacturing process of a random companySaugata Palit
 
Comparison of the old & new company law
Comparison of the old & new company lawComparison of the old & new company law
Comparison of the old & new company lawSaugata Palit
 
Communication in a culturally diverse organization
Communication in a culturally diverse organizationCommunication in a culturally diverse organization
Communication in a culturally diverse organizationSaugata Palit
 
Marketing a product( Example Healthy Pastries)
Marketing a product( Example Healthy Pastries)Marketing a product( Example Healthy Pastries)
Marketing a product( Example Healthy Pastries)Saugata Palit
 
Business Environments
Business EnvironmentsBusiness Environments
Business EnvironmentsSaugata Palit
 
Invoice generation system
Invoice generation systemInvoice generation system
Invoice generation systemSaugata Palit
 
Media is a mixed blessing
Media is a mixed blessingMedia is a mixed blessing
Media is a mixed blessingSaugata Palit
 
Verbal Communication
Verbal CommunicationVerbal Communication
Verbal CommunicationSaugata Palit
 

Plus de Saugata Palit (20)

Sports and mental health
Sports and mental healthSports and mental health
Sports and mental health
 
How handwriting communicates
How handwriting communicatesHow handwriting communicates
How handwriting communicates
 
Customers Expectation of a Service
Customers Expectation of a ServiceCustomers Expectation of a Service
Customers Expectation of a Service
 
Pepsico Sales Structure
Pepsico Sales StructurePepsico Sales Structure
Pepsico Sales Structure
 
IPA vs THF
IPA vs THFIPA vs THF
IPA vs THF
 
Vision and Mission statements
Vision and Mission statementsVision and Mission statements
Vision and Mission statements
 
Parental Gatekeeping in Diasporic familes
Parental Gatekeeping in Diasporic familesParental Gatekeeping in Diasporic familes
Parental Gatekeeping in Diasporic familes
 
Too old to learn
Too old to learnToo old to learn
Too old to learn
 
E commerce and supply chain management
E commerce and supply chain managementE commerce and supply chain management
E commerce and supply chain management
 
Vision & Mission of Coke , PWC , Flipkart , Caterpillar
Vision & Mission of Coke , PWC , Flipkart , Caterpillar Vision & Mission of Coke , PWC , Flipkart , Caterpillar
Vision & Mission of Coke , PWC , Flipkart , Caterpillar
 
Competitive analysis of jabong and myntra
Competitive analysis of jabong and myntraCompetitive analysis of jabong and myntra
Competitive analysis of jabong and myntra
 
Manufacturing process of a random company
Manufacturing process of a random companyManufacturing process of a random company
Manufacturing process of a random company
 
Comparison of the old & new company law
Comparison of the old & new company lawComparison of the old & new company law
Comparison of the old & new company law
 
Communication in a culturally diverse organization
Communication in a culturally diverse organizationCommunication in a culturally diverse organization
Communication in a culturally diverse organization
 
Marketing a product( Example Healthy Pastries)
Marketing a product( Example Healthy Pastries)Marketing a product( Example Healthy Pastries)
Marketing a product( Example Healthy Pastries)
 
Business Environments
Business EnvironmentsBusiness Environments
Business Environments
 
Invoice generation system
Invoice generation systemInvoice generation system
Invoice generation system
 
Media is a mixed blessing
Media is a mixed blessingMedia is a mixed blessing
Media is a mixed blessing
 
Steganography
SteganographySteganography
Steganography
 
Verbal Communication
Verbal CommunicationVerbal Communication
Verbal Communication
 

Dernier

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Dernier (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Network topologies for management

  • 1. There are three basic configurations used to connect computers they are the Bus Ring Star
  • 3. Bus topology This type of network was widely used in the 1980’s  In this configuration every computer (node) shares the networks total bus capacities.  In this configuration adding more computers will reduce the access speed on the network.  Each computer communicates to other computers on the network independently this is referred to as PEER-TO-PEER networking 
  • 4. How a Bus Peer to Peer Network Works All computers on a network have a distinct address just like your house does  a message would be send from one computer with the address of another computer attached to the message  The message is broadcasted to all the computers on the network until the addressed PC accepts the message 
  • 5. Problems  One of the main problems with this type of network is that it is not very fault tolerant, a break or defect in the bus would affect the whole network
  • 6. Ring Topology In Ring topology each node is connected to the two nearest nodes so the entire network forms a circle  Data only travels in one direction on a Ring network 
  • 7. How this Topology works a node has information to send to another computer on the network so it sends the information out on the network to the PC it is connected to, if the information is for this PC (the recipients NIC address is attached to the message, which is like putting an address on an envelope) then the PC accepts the data  otherwise it passes the information on to the next PC by repeating the data back out on the line  This method of repeating the data helps keep the integrity of the data readable by other computers 
  • 8. How it Works As it is better to have computers take turns using the connecting Data cable, Ring topologies incorporated a system called Token passing  In this topology, to transmit on the wire your computer must have control of the token or wait for the token to be free  Larger Token Ring networks use multiple tokens 
  • 9. Problems and Solutions       The drawback to this type of topology is that a single malfunctioning workstation can disable the whole network To make sure all the information is sent the receiving PC sends the token back to the sending PC after it has received all the data If the sending PC is finished sending it passes the token to the next PC This type of network was also widely used in the 1980’s This type of network used Thinnet cable joining nodes. In the mid 1980’s Thinnet cable was replaced by Category 3 Ethernet cable capable of handling up to 10Mbps
  • 10. Star topology HUB In a Star topology every node is connected through a central device such as a Hub, Switch or Router  Compared to a Ring or Bus topology a Star topology requires that more thought be put into its setup 
  • 11. The Good and Bad of a Star Network The upside of a star network is that if any one cable fails then only the node connected on that cable would be affected  Another positive point to this type of network is that it is very simple to join two star networks together by connecting their central devices to each other 
  • 12. The Good and Bad of a Star Network As each computer is connected to a central device (Hub) the location of the Hub must be made as central as possible, so as to reduce cable lengths  The drawback to this type of topology is if a central device was to fail then all computers connected to that device would not be able to see the network 
  • 13. What is a Hub? A hub is usually a small rectangular box, often made of plastic, which receives its power from an ordinary wall outlet  A hub joins multiple computers (or other network devices) together to form a single network segment  On this network segment, all computers can communicate directly with each other 
  • 14. What is a Hub? Ethernet hubs are by far the most common type, but hubs for other types of networks such as USB also exist  A hub includes a series of ports that each accepts a network cable  Small hubs can network four computers together  They contain four or sometimes five ports 
  • 15. What is a Hub? Many times the fifth port is reserved for "uplink" which is the connecting of one hub to another hub or similar device (joining two segments together).  Larger hubs contain eight, 12, 16, and even 24 ports 
  • 16. Key Features of Hubs Hubs classify as Layer 1 devices in the OSI model  OSI stands for : The Open Systems Interconnection Basic Reference Model  At the physical layer, hubs can support little in the way of sophisticated networking  Hubs do not read any of the data passing through them and are not aware of their source or destination 
  • 17. Key Features of Hubs Essentially, a hub simply receives incoming packets, possibly amplifies the electrical signal, and broadcasts these packets out to all devices on the network - including the one that originally sent the packet!  a packet is a formatted block of data carried by a computer network 
  • 18. Different Types of Hubs  Technically speaking, three different types of hubs exist Passive Active Intelligent
  • 19. Passive hubs  Passive hubs do not amplify the electrical signal of incoming packets before broadcasting them out to the network Active hubs  amplify the electrical signal of incoming packets back to their original level before broadcasting them back out on the network
  • 20. What is a Network Switch? A network switch is a small hardware device that joins multiple computers together within one local area network (LAN)  Technically, network switches operate at layer two (Data Link Layer) of the OSI model 
  • 21. What is a Router? Routers are physical devices that join multiple wired or wireless networks together  Technically, a wired or wireless router is a Layer 3 gateway, meaning that the wired/wireless router connects networks together  A Gateway is a device that acts like a security guard and only allows data in or out if it has the right network headers 
  • 22. Routers Home “networkers” often use an Internet Protocol (IP) wired or wireless router  IP is the most common OSI network layer protocol  Protocols are the rules governing the transfer of data information, it can also be compared to how humans use languages (to get your point across you must talk in the same language as the person you are speaking to). 
  • 23. Routers An IP router such as a DSL or cable modem are broadband routers and joins the home's local area network (LAN) to the wide-area network (WAN) of the Internet  A Broadband Router is a device that allows multiple PC’s to access the Internet using only one address. 