SlideShare une entreprise Scribd logo
1  sur  10
Information Technology In Business (ITB)
REPORT
ON
COMPUTER NETWORKS & NETWORK TOPOLOGIES
Submitted to:
Professor RIZWAN ALI
Computer Networks and network topologies
Introduction:
A computer network is a set of connected computers. Computers on a
network are called nodes. The connection between computers can be done via cabling, most
commonly the Ethernet cable, or wirelessly through radio waves. Connected computers can
share resources, like access to the Internet, printers, file servers, and others. A network is a
multipurpose connection, which allows a single computer to do more.
Computer network is a telecommunication channel through which we can
share our data. It is also called data network. The best example of computer network is
Internet. Computer network does not mean a system with control unit and other systems as
its slave. It is called a distributed system.
Types of Computer Networks
The size of a network can be expressed by the geographic area they occupy and the
number of computers that are part of the network. Networks can cover anything from a
handful of devices within a single room to millions of devices spread across the entire globe.
Some of the different networks based on size are:
 Personal area network, or PAN
 Local area network, or LAN
 Metropolitan area network, or MAN
 Wide
area network, or
WAN
Personal Area Network:
A personal area network, or PAN, is a computer network
organized around an individual person within a single building. This could be inside a small
office or residence. A typical PAN would include one or more computers, telephones,
peripheral devices, video game consoles and other personal entertainment devices.
Local Area Network:
A local area network, or LAN, consists of a computer network at a
single site, typically an individual office building. A LAN is very useful for sharing resources,
such as data storage and printers. LANs can be built with relatively inexpensive hardware,
such as hubs, network adapters and Ethernet cables.
Metropolitan Area Network:
A metropolitan area network, or MAN, consists of a
computer network across an entire city, college campus or small region. A MAN is larger
than a LAN, which is typically limited to a single building or site. Depending on the
configuration, this type of network can cover an area from several miles to tens of miles.
Wide Area Network:
A wide area network, or WAN, occupies a very large area, such as
an entire country or the entire world. A WAN can contain multiple smaller networks, such as
LANs or MANs. The Internet is the best-known example of a public WAN.
Typesof Network Topology
In communication networks, a topology is a usually schematic description of the
arrangement of a network, including its nodes and connecting lines. There are two ways of
defining network geometry: the physical topology and the logical (or signal) topology.
 BUS Topology
 RING Topology
 STAR Topology
 MESH Topology
 TREE Topology
 HYBRID Topology
BUS Topology:
Bus topology is a network type in where every computer and network
device is connected to single cable. Bus networks (not to be confused with the system bus of
a
computer
) use a
common
backbone
to
connect
all
devices.
Features of Bus Topology
 It transmits data only in one direction.
 Every device is connected to a single cable.
Advantages of Bus Topology
 Easy to expand.
 Cost effective.
Disadvantages of Bus Topology
 Data transfer only in one direction.
 Limited length of cables.
RING Topology:
In a ring network, every device has exactly two neighbors for
communication purposes. All messages travel through a ring in the same direction (either
"clockwise" or "counterclockwise").
Features of Ring Topology
 A number of repeaters are used and the transmission is unidirectional.
 Date is transferred in a sequential manner that is bit by bit.
Advantages of Ring Topology
 Cheap to install and expand.
 Each computer has equal access to resources.
Disadvantages of Ring Topology
 Trouble shooting is difficult.
 If one work station goes down, the entire network gets affected.
STAR Topology:
In this type of topology all the computers are connected to a single hub through a cable. This hub
is the central node and all others nodes are connected to the central node.
Features of Star Topology:
 Every node has its own dedicated connection to the hub.
 Acts as a repeater for data flow.
 Can be used with twisted pair, Optical Fibre or coaxial cable.
Advantages of Star Topology
 Fast performance.
 Easy to troubleshoot
Disadvantages of Star Topology
 High cost.
 Performance is based on hub.
MESH Topology:
It is a point-to-point connection to other nodes or devices. Traffic is
carried only between two devices or nodes to which it is connected. Mesh has n (n-2)/2
physical channels to link hn devices. Mesh topology introduces the concept of routes. Unlike
each of the previous topologies, messages sent on a mesh network can take any of several
possible
paths from
source to
destinatio
n.
Types of Mesh Topology:
 Partial Mesh Topology: In this topology some of the systems are connected in the
same fashion as mesh topology but some devices are only connected to two or three
devices.
 Full Mesh Topology: Each and every nodes or devices are connected to each other.
Features of Mesh Topology
 Fully connected.
 Robust.
 Not flexible.
Advantages of Mesh Topology
 Each connection can carry its own data load.
 Provide security and privacy .
Disadvantages of Mesh Topology
 Cabling cost is more.
 Bulk wiring is required.
TREE Topology:
It has a root node and all other nodes are connected to it forming a
hierarchy. It is also called hierarchical topology. It should at least have three levels to the
hierarchy. A tree topology joins multiple star topologies together onto a bus. In its
simplest form, only hub devices connect directly to the tree bus, and each hub
functions as the root of a tree of devices.
Features of Tree Topology
 Ideal if workstations are located in groups.
 Used in Wide Area Network.
Advantages of Tree Topology
 Easily manage and maintain.
 Error detection is easily turn.
Disadvantages of Tree Topology
 Expensive due to cabling.
 Scalability of the network depends on the type of cable used.
HYBRID Topology:
It is two different types of topologies which is a mixture of two or more
topologies. Hybrid topology inherits merits and demerits of all the incorporating topologies.
For example if in an office in one department ring topology is used and in another star
topology is used, connecting these topologies will result in Hybrid Topology (ring topology
and star topology).
Features of Hybrid Topology:
 It is a combination of two or topologies
 Inherits the advantages and disadvantages of the topologies included
Advantages of Hybrid Topology
 Reliable as Error detecting and trouble shooting is easy.
 Effective.
 Scalable as size can be increased easily.
 Flexible.
Disadvantages of Hybrid Topology
 Complex in design.
 Costly.
Conclusion:
Topology remain an important part of network design theory. You can probably build a home
or small business computer network without understanding the difference between a bus
design and a star design, but becoming familiar with the standard topologies gives you a
better understanding of important networking concepts like hubs, broadcasts, and routes.
References:
http://www.studytonight.com/computer-networks/network-topology-types
http://study.com/academy/lesson/how-star-topology-connects-computer-networks-in-
organizations.html
http://www.tutorialspoint.com/data_communication_computer_network/computer_network_to
pologies.htm

Contenu connexe

Tendances (20)

Volte ppt
Volte pptVolte ppt
Volte ppt
 
5G Technology Tutorial
5G Technology Tutorial5G Technology Tutorial
5G Technology Tutorial
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Network topology
Network topologyNetwork topology
Network topology
 
Network Types and Topologies
Network Types and TopologiesNetwork Types and Topologies
Network Types and Topologies
 
Cell Phone Towers.pptx
Cell Phone Towers.pptxCell Phone Towers.pptx
Cell Phone Towers.pptx
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
 
Femtocell ppt
Femtocell pptFemtocell ppt
Femtocell ppt
 
Wireless network presentation
Wireless network presentationWireless network presentation
Wireless network presentation
 
4G and 5g network
4G and 5g  network4G and 5g  network
4G and 5g network
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Mobile Effects on Human Body
Mobile Effects on Human BodyMobile Effects on Human Body
Mobile Effects on Human Body
 
Wireless technologies
Wireless technologiesWireless technologies
Wireless technologies
 
Popular network devices
Popular network devicesPopular network devices
Popular network devices
 
Rain technology ppt
Rain technology pptRain technology ppt
Rain technology ppt
 
NETWORK INTERFACE CARD
NETWORK INTERFACE CARDNETWORK INTERFACE CARD
NETWORK INTERFACE CARD
 
Network topology
Network topologyNetwork topology
Network topology
 
Network topology
Network topologyNetwork topology
Network topology
 
Wireless communication technologies
Wireless communication technologiesWireless communication technologies
Wireless communication technologies
 
Types of wireless communication technologies
Types of wireless communication technologiesTypes of wireless communication technologies
Types of wireless communication technologies
 

En vedette

A qualitative review of market research in social media susan bell research f...
A qualitative review of market research in social media susan bell research f...A qualitative review of market research in social media susan bell research f...
A qualitative review of market research in social media susan bell research f...Ray Poynter
 
Bijpraten over trends en ontwikkelingen in de zorg 2015
Bijpraten over trends en ontwikkelingen in de zorg 2015Bijpraten over trends en ontwikkelingen in de zorg 2015
Bijpraten over trends en ontwikkelingen in de zorg 2015John Hokkeling
 
The Top 10 Disruptive Macro Trends In Market Research For 2015
The Top 10 Disruptive Macro Trends In Market Research For 2015The Top 10 Disruptive Macro Trends In Market Research For 2015
The Top 10 Disruptive Macro Trends In Market Research For 2015MRAMidAtlanticChapter
 
The latest trends in mobile market research
The latest trends in mobile market researchThe latest trends in mobile market research
The latest trends in mobile market researchMROC Japan
 
Social Media Week 2014: Modern Market Research
Social Media Week 2014: Modern Market Research Social Media Week 2014: Modern Market Research
Social Media Week 2014: Modern Market Research Mashwork
 

En vedette (6)

A qualitative review of market research in social media susan bell research f...
A qualitative review of market research in social media susan bell research f...A qualitative review of market research in social media susan bell research f...
A qualitative review of market research in social media susan bell research f...
 
Bijpraten over trends en ontwikkelingen in de zorg 2015
Bijpraten over trends en ontwikkelingen in de zorg 2015Bijpraten over trends en ontwikkelingen in de zorg 2015
Bijpraten over trends en ontwikkelingen in de zorg 2015
 
The Top 10 Disruptive Macro Trends In Market Research For 2015
The Top 10 Disruptive Macro Trends In Market Research For 2015The Top 10 Disruptive Macro Trends In Market Research For 2015
The Top 10 Disruptive Macro Trends In Market Research For 2015
 
The latest trends in mobile market research
The latest trends in mobile market researchThe latest trends in mobile market research
The latest trends in mobile market research
 
Mobile Trends & Innovations Research 2016
Mobile Trends & Innovations Research 2016Mobile Trends & Innovations Research 2016
Mobile Trends & Innovations Research 2016
 
Social Media Week 2014: Modern Market Research
Social Media Week 2014: Modern Market Research Social Media Week 2014: Modern Market Research
Social Media Week 2014: Modern Market Research
 

Similaire à Computer network-and Network topology

Computer Networks
Computer NetworksComputer Networks
Computer NetworksRaj vardhan
 
Distributed Structure System
Distributed Structure SystemDistributed Structure System
Distributed Structure Systemhusnaina_akhtar
 
Networktopology xii
Networktopology xiiNetworktopology xii
Networktopology xiisaltyp
 
Classification of Computer
Classification of ComputerClassification of Computer
Classification of ComputerAfsanaAkterRubi
 
Networking Concepts.pdf
Networking Concepts.pdfNetworking Concepts.pdf
Networking Concepts.pdfODINARARCH
 
Networking presentation
Networking presentationNetworking presentation
Networking presentationGajan Hai
 
fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)Sorath Peetamber
 
Presentation for slideshare
Presentation for slidesharePresentation for slideshare
Presentation for slideshareBSITstudents
 
454548 634160871407732500
454548 634160871407732500454548 634160871407732500
454548 634160871407732500prabh_in
 
COMPUTER FUNDAMENTAL PART 3.pptx
COMPUTER FUNDAMENTAL PART 3.pptxCOMPUTER FUNDAMENTAL PART 3.pptx
COMPUTER FUNDAMENTAL PART 3.pptxSURBHI SAROHA
 

Similaire à Computer network-and Network topology (20)

Network -Lecture Notes
Network -Lecture NotesNetwork -Lecture Notes
Network -Lecture Notes
 
Networking.pptx
Networking.pptxNetworking.pptx
Networking.pptx
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Distributed Structure System
Distributed Structure SystemDistributed Structure System
Distributed Structure System
 
networking
networkingnetworking
networking
 
COMPUTER TAPALOGY
COMPUTER TAPALOGYCOMPUTER TAPALOGY
COMPUTER TAPALOGY
 
Networking
NetworkingNetworking
Networking
 
Networktopology xii
Networktopology xiiNetworktopology xii
Networktopology xii
 
Classification of Computer
Classification of ComputerClassification of Computer
Classification of Computer
 
NETWORKING
NETWORKINGNETWORKING
NETWORKING
 
Networking Concepts.pdf
Networking Concepts.pdfNetworking Concepts.pdf
Networking Concepts.pdf
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Presentation for slideshare
Presentation for slidesharePresentation for slideshare
Presentation for slideshare
 
454548 634160871407732500
454548 634160871407732500454548 634160871407732500
454548 634160871407732500
 
Class work3
Class work3Class work3
Class work3
 
COMPUTER FUNDAMENTAL PART 3.pptx
COMPUTER FUNDAMENTAL PART 3.pptxCOMPUTER FUNDAMENTAL PART 3.pptx
COMPUTER FUNDAMENTAL PART 3.pptx
 

Plus de Rida Shad

Mutual fund_AL-MEEZAN INVESTMENT
Mutual fund_AL-MEEZAN INVESTMENTMutual fund_AL-MEEZAN INVESTMENT
Mutual fund_AL-MEEZAN INVESTMENTRida Shad
 
Financial report
Financial reportFinancial report
Financial reportRida Shad
 
Gsk financial report ppt
Gsk financial report pptGsk financial report ppt
Gsk financial report pptRida Shad
 
BAD News LETTER
BAD News LETTERBAD News LETTER
BAD News LETTERRida Shad
 
Social Media
Social MediaSocial Media
Social MediaRida Shad
 
Case Study zara_solution
Case Study zara_solutionCase Study zara_solution
Case Study zara_solutionRida Shad
 
GlaxoSmithKline Pakistan Pharmaceutical company
GlaxoSmithKline Pakistan Pharmaceutical companyGlaxoSmithKline Pakistan Pharmaceutical company
GlaxoSmithKline Pakistan Pharmaceutical companyRida Shad
 
Macter Pharma (MR MOHSIN YASIR KHAN)
Macter Pharma (MR MOHSIN YASIR KHAN)Macter Pharma (MR MOHSIN YASIR KHAN)
Macter Pharma (MR MOHSIN YASIR KHAN)Rida Shad
 
PAKISTAN BEVERAGES LIMITED
PAKISTAN BEVERAGES LIMITEDPAKISTAN BEVERAGES LIMITED
PAKISTAN BEVERAGES LIMITEDRida Shad
 
PAKISTAN BEVERAGES LIMITED
PAKISTAN BEVERAGES LIMITEDPAKISTAN BEVERAGES LIMITED
PAKISTAN BEVERAGES LIMITEDRida Shad
 
Pyschology presentation
Pyschology presentationPyschology presentation
Pyschology presentationRida Shad
 
Computer network-and-network-topologies
Computer network-and-network-topologiesComputer network-and-network-topologies
Computer network-and-network-topologiesRida Shad
 

Plus de Rida Shad (12)

Mutual fund_AL-MEEZAN INVESTMENT
Mutual fund_AL-MEEZAN INVESTMENTMutual fund_AL-MEEZAN INVESTMENT
Mutual fund_AL-MEEZAN INVESTMENT
 
Financial report
Financial reportFinancial report
Financial report
 
Gsk financial report ppt
Gsk financial report pptGsk financial report ppt
Gsk financial report ppt
 
BAD News LETTER
BAD News LETTERBAD News LETTER
BAD News LETTER
 
Social Media
Social MediaSocial Media
Social Media
 
Case Study zara_solution
Case Study zara_solutionCase Study zara_solution
Case Study zara_solution
 
GlaxoSmithKline Pakistan Pharmaceutical company
GlaxoSmithKline Pakistan Pharmaceutical companyGlaxoSmithKline Pakistan Pharmaceutical company
GlaxoSmithKline Pakistan Pharmaceutical company
 
Macter Pharma (MR MOHSIN YASIR KHAN)
Macter Pharma (MR MOHSIN YASIR KHAN)Macter Pharma (MR MOHSIN YASIR KHAN)
Macter Pharma (MR MOHSIN YASIR KHAN)
 
PAKISTAN BEVERAGES LIMITED
PAKISTAN BEVERAGES LIMITEDPAKISTAN BEVERAGES LIMITED
PAKISTAN BEVERAGES LIMITED
 
PAKISTAN BEVERAGES LIMITED
PAKISTAN BEVERAGES LIMITEDPAKISTAN BEVERAGES LIMITED
PAKISTAN BEVERAGES LIMITED
 
Pyschology presentation
Pyschology presentationPyschology presentation
Pyschology presentation
 
Computer network-and-network-topologies
Computer network-and-network-topologiesComputer network-and-network-topologies
Computer network-and-network-topologies
 

Dernier

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Dernier (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Computer network-and Network topology

  • 1. Information Technology In Business (ITB) REPORT ON COMPUTER NETWORKS & NETWORK TOPOLOGIES Submitted to: Professor RIZWAN ALI Computer Networks and network topologies Introduction: A computer network is a set of connected computers. Computers on a network are called nodes. The connection between computers can be done via cabling, most commonly the Ethernet cable, or wirelessly through radio waves. Connected computers can share resources, like access to the Internet, printers, file servers, and others. A network is a multipurpose connection, which allows a single computer to do more. Computer network is a telecommunication channel through which we can share our data. It is also called data network. The best example of computer network is Internet. Computer network does not mean a system with control unit and other systems as its slave. It is called a distributed system.
  • 2.
  • 3. Types of Computer Networks The size of a network can be expressed by the geographic area they occupy and the number of computers that are part of the network. Networks can cover anything from a handful of devices within a single room to millions of devices spread across the entire globe. Some of the different networks based on size are:  Personal area network, or PAN  Local area network, or LAN  Metropolitan area network, or MAN  Wide area network, or WAN Personal Area Network: A personal area network, or PAN, is a computer network organized around an individual person within a single building. This could be inside a small office or residence. A typical PAN would include one or more computers, telephones, peripheral devices, video game consoles and other personal entertainment devices. Local Area Network: A local area network, or LAN, consists of a computer network at a single site, typically an individual office building. A LAN is very useful for sharing resources, such as data storage and printers. LANs can be built with relatively inexpensive hardware, such as hubs, network adapters and Ethernet cables. Metropolitan Area Network: A metropolitan area network, or MAN, consists of a computer network across an entire city, college campus or small region. A MAN is larger than a LAN, which is typically limited to a single building or site. Depending on the configuration, this type of network can cover an area from several miles to tens of miles. Wide Area Network:
  • 4. A wide area network, or WAN, occupies a very large area, such as an entire country or the entire world. A WAN can contain multiple smaller networks, such as LANs or MANs. The Internet is the best-known example of a public WAN. Typesof Network Topology In communication networks, a topology is a usually schematic description of the arrangement of a network, including its nodes and connecting lines. There are two ways of defining network geometry: the physical topology and the logical (or signal) topology.  BUS Topology  RING Topology  STAR Topology  MESH Topology  TREE Topology  HYBRID Topology BUS Topology: Bus topology is a network type in where every computer and network device is connected to single cable. Bus networks (not to be confused with the system bus of a computer ) use a common backbone to connect all devices.
  • 5. Features of Bus Topology  It transmits data only in one direction.  Every device is connected to a single cable. Advantages of Bus Topology  Easy to expand.  Cost effective. Disadvantages of Bus Topology  Data transfer only in one direction.  Limited length of cables. RING Topology: In a ring network, every device has exactly two neighbors for communication purposes. All messages travel through a ring in the same direction (either "clockwise" or "counterclockwise"). Features of Ring Topology  A number of repeaters are used and the transmission is unidirectional.  Date is transferred in a sequential manner that is bit by bit. Advantages of Ring Topology
  • 6.  Cheap to install and expand.  Each computer has equal access to resources. Disadvantages of Ring Topology  Trouble shooting is difficult.  If one work station goes down, the entire network gets affected. STAR Topology: In this type of topology all the computers are connected to a single hub through a cable. This hub is the central node and all others nodes are connected to the central node. Features of Star Topology:  Every node has its own dedicated connection to the hub.  Acts as a repeater for data flow.  Can be used with twisted pair, Optical Fibre or coaxial cable. Advantages of Star Topology  Fast performance.  Easy to troubleshoot Disadvantages of Star Topology  High cost.  Performance is based on hub. MESH Topology:
  • 7. It is a point-to-point connection to other nodes or devices. Traffic is carried only between two devices or nodes to which it is connected. Mesh has n (n-2)/2 physical channels to link hn devices. Mesh topology introduces the concept of routes. Unlike each of the previous topologies, messages sent on a mesh network can take any of several possible paths from source to destinatio n. Types of Mesh Topology:  Partial Mesh Topology: In this topology some of the systems are connected in the same fashion as mesh topology but some devices are only connected to two or three devices.  Full Mesh Topology: Each and every nodes or devices are connected to each other. Features of Mesh Topology  Fully connected.  Robust.  Not flexible. Advantages of Mesh Topology  Each connection can carry its own data load.
  • 8.  Provide security and privacy . Disadvantages of Mesh Topology  Cabling cost is more.  Bulk wiring is required. TREE Topology: It has a root node and all other nodes are connected to it forming a hierarchy. It is also called hierarchical topology. It should at least have three levels to the hierarchy. A tree topology joins multiple star topologies together onto a bus. In its simplest form, only hub devices connect directly to the tree bus, and each hub functions as the root of a tree of devices. Features of Tree Topology  Ideal if workstations are located in groups.  Used in Wide Area Network. Advantages of Tree Topology  Easily manage and maintain.  Error detection is easily turn. Disadvantages of Tree Topology  Expensive due to cabling.  Scalability of the network depends on the type of cable used.
  • 9. HYBRID Topology: It is two different types of topologies which is a mixture of two or more topologies. Hybrid topology inherits merits and demerits of all the incorporating topologies. For example if in an office in one department ring topology is used and in another star topology is used, connecting these topologies will result in Hybrid Topology (ring topology and star topology). Features of Hybrid Topology:  It is a combination of two or topologies  Inherits the advantages and disadvantages of the topologies included Advantages of Hybrid Topology  Reliable as Error detecting and trouble shooting is easy.  Effective.
  • 10.  Scalable as size can be increased easily.  Flexible. Disadvantages of Hybrid Topology  Complex in design.  Costly. Conclusion: Topology remain an important part of network design theory. You can probably build a home or small business computer network without understanding the difference between a bus design and a star design, but becoming familiar with the standard topologies gives you a better understanding of important networking concepts like hubs, broadcasts, and routes. References: http://www.studytonight.com/computer-networks/network-topology-types http://study.com/academy/lesson/how-star-topology-connects-computer-networks-in- organizations.html http://www.tutorialspoint.com/data_communication_computer_network/computer_network_to pologies.htm