SlideShare a Scribd company logo
1 of 33
FROM
ALFIA FATMA
TAPESH CHALISGAONKAR
Main Menu
OBJECTIVE
CONTENT
EXERCISE
SUMMARY
EXIT
At the end of this lesson, student should be able
to achieve all the three objective below:-
OBJECTIVE
MAIN MENU SUMMARY EXITEXERCISECONTENT
At the end of this lesson, student should be able
to achieve all the three objective below:-
Explain meaning of network topology with
correctly.
State three types of network topologies
correctly.
Differentiate correctly between the three types
of network topology.
CONTENT
MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
Definition of
Network Topology
Types of
Network Topology
Differentiation Between the
Types of Network Topology
DEFINITION
What is a Topology ?
The physical topology of a network
refers to the configuration of cables,
computers and other peripherals.
MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
TYPES OF NETWORK TOPOLOGY
Three commonly used network topologies
are:-
Bus network.
Ring network.
Star network.
MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
BUS TOPOLOGY
All computers and devices
connected to central cable or bus.
Consists of a main run of cable
with a terminator at each end.
Popular on LANs because they
are inexpensive and easy to
install.
MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
BUS TOPOLOGY
MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
BUS TOPOLOGY
MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
RING TOPOLOGY
Cable forms closed ring or loop,
with all computers and devices
arranged along ring.
Data travels from device to
device around entire ring, in
one direction.
Primarily is used for LANs,
but also is used in WANs.
MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
RING TOPOLOGY
MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
STAR TOPOLOGY
All devices connect to a
central device, called
hub.
All data transferred
from one computer to
another passes through
hub.
MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
STAR TOPOLOGY
MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
STAR TOPOLOGY
MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
DIFFERENTIATION BETWEEN THE THREE
TYPES OF NETWORK TOPOLOGY
MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
WHAT IS DIFFERENTIATION
BETWEEN THE THREE OF
NETWORK TOPOLOGY?
SEARCH IN THE INTERNET
DIFFERENTIATION BETWEEN THE THREE
TYPES OF NETWORK TOPOLOGY
MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
http://en.wikipedia.org/wiki/Network_topology
http://home.att.net/~charlie.net/cMctopology.htm
DIFFERENTIATION BETWEEN THE THREE
TYPES OF NETWORK TOPOLOGY
MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
ADVANTAGE DISADVANTAGE
1) Easy to connect computer or
peripheral to a linear bus.
1) Entire network shuts down if
there is a break in the main
cable.
2) Requires less cable length
than a star topology.
2) Terminators are required at
both ends of the backbone
cable.
3) Difficult to identify the
problem if the entire network
shuts down.
BUS
DIFFERENTIATION BETWEEN THE THREE
TYPES OF NETWORK TOPOLOGY
MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
ADVANTAGE DISADVANTAGE
1) Data is quickly transferred
without a ‘bottle neck’.
1) Data packets must pass
through every computer
between the sender and
recipient therefore, this makes
it slower.
2) The transmission of data is
relatively simple as packets
travel in one direction only.
2) If any of the nodes fail then the
ring is broken and data cannot be
transmitted successfully.
3) It is difficult to troubleshoot
the ring.
RING
DIFFERENTIATION BETWEEN THE THREE
TYPES OF NETWORK TOPOLOGY
MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
ADVANTAGE DISADVANTAGE
1) Easy to install and wire. 1) Requires more cable length
than a linear topology.
2) Security can be implemented
in the hub/switch.
2) If the hub or concentrator
fails, nodes attached are
disabled.
3) Easy to detect faults and to
remove parts.
3) More expensive than linear
bus topologies because of the
cost of the concentrators.
STAR
EXERCISE
MAIN MENU SUMMARY EXITCONTENTOBJECTIVE
1) Which of the following statements describe
about network topology correctly ?
A. Devices attached or detached at any
point on the network.
B. The failure of device on the network.
C. Refers to the configuration of cables,
computers and other peripherals.
D. All of the above.
EXERCISE
MAIN MENU SUMMARY EXITCONTENTOBJECTIVE
2)On a __________, all of the computers and
devices (nodes) on the network connect to a
central device.
A. Bus network.
B. Ring network.
C. Star network.
D. All of above.
EXERCISE
MAIN MENU SUMMARY EXITCONTENTOBJECTIVE
3)On a star network, the central
device that provides a common connection
point for nodes on the network is called the
__________.
A. Hub.
B. Personal computer.
C. Printer.
D. File server.
EXERCISE
MAIN MENU SUMMARY EXITCONTENTOBJECTIVE
4) On a bus network, such as that illustrated in the
accompanying figure, if one node fails ________.
A. Only that node is affected.
B. Only the nodes before that node are affected.
C. Only the nodes after that node are affected.
D. All the nodes are affected.
EXERCISE
MAIN MENU SUMMARY EXITCONTENTOBJECTIVE
The transmission of data is relatively simple
as packets travel in one direction only.
5) The statement above is correctly
refer to the ______.
A. Bus network.
B. Ring network.
C. Star network.
D. All of the above.
EXERCISE
MAIN MENU SUMMARY EXITCONTENTOBJECTIVE
6) All the statements true about ring topology
except
A. Data is quickly transferred without a
‘bottle neck’.
B. The transmission of data is relatively simple as
packets travel in one direction only.
C. If any of the nodes fail then the ring is broken
and data cannot be transmitted successfully.
D. Security can be implemented in the hub/switch.
EXERCISE
MAIN MENU SUMMARY EXITCONTENTOBJECTIVE
7) The statement true about star topology
is
A. Difficult to identify the problem if the entire
network shuts down.
B. Terminators are required at both ends of the
backbone cable.
C. The transmission of data is relatively simple
as packets travel in one direction only.
D. Easy to detect faults and to remove parts.
ANSWER
MAIN MENU SUMMARY EXITCONTENTOBJECTIVE
YOU ANSWER IS WRONG,
TRY AGAIN !!!
QUESTION 1
QUESTION 2
QUESTION 3
QUESTION 4
QUESTION 5
QUESTION 6
QUESTION 7
ANSWER
YOU ANSWER
IS CORRECT !!!
QUESTION 1
QUESTION 2
QUESTION 3
QUESTION 4
QUESTION 5
QUESTION 6
QUESTION 7
MAIN MENU SUMMARY EXITCONTENTOBJECTIVE
SUMMARY
MAIN MENU EXERCISE EXITCONTENTOBJECTIVE
BUS TOPOLOGY
DEFINITION
•All computers
and devices
connected to
central cable
ADVANTAGE
•Easy to connect a
computer or
peripheral to a linear
bus.
•Requires less cable
length than
a star topology.
DISADVANTAGE
•Entire network shuts
down if
there is a break in the
main cable.
•Terminators are
required at both
ends of the backbone
cable.
•Difficult to identify
the problem
if the entire network
shuts down.
SUMMARY
RING TOPOLOGY
DEFINITION
•Cable forms
closed ring or
loop, with all
computers and
devices arranged
along ring.
ADVANTAGE
•Data is quickly
transferred without a
‘bottle neck’.
•The transmission of
data is relatively
simple as packets
travel in one direction
only.
DISADVANTAGE
•Data packets must pass
through every computer
between the sender and
recipient therefore, this
makes it slower.
•If any of the nodes fail
then the ring is broken
and data cannot be
transmitted successfully.
•It is difficult to
troubleshoot
the ring.
MAIN MENU EXERCISE EXITCONTENTOBJECTIVE
SUMMARY
DEFINITION
•All devices
connect to a
central device,
called hub.
ADVANTAGE
•Easy to install and
wire.
•Security can be
implemented
in the hub/switch.
DISADVANTAGE
•Requires more cable
length
than a linear topology.
If the hub or
concentrator fails,
nodes attached are
disabled.
More expensive than
linear bus topologies
because of the cost of
the concentrators.
STAR TOPOLOGY
•Easy to detect faults
and to
remove parts
MAIN MENU EXERCISE EXITCONTENTOBJECTIVE
ARE YOU SURE TO EXIT ?
YES NO
THANK
YOU

More Related Content

What's hot (20)

Network topology
Network topologyNetwork topology
Network topology
 
NETWORK TOPOLOGIES (NETWORK TOPOLOGY)
NETWORK TOPOLOGIES (NETWORK TOPOLOGY)NETWORK TOPOLOGIES (NETWORK TOPOLOGY)
NETWORK TOPOLOGIES (NETWORK TOPOLOGY)
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devices
 
Topology
TopologyTopology
Topology
 
Network topology by Dr. Gholkar D. R.
Network topology by Dr. Gholkar D. R.Network topology by Dr. Gholkar D. R.
Network topology by Dr. Gholkar D. R.
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network Topology And Its Types
Network Topology And Its TypesNetwork Topology And Its Types
Network Topology And Its Types
 
Network Topology and it's types Star topology, Ring topology, Bus topology an...
Network Topology and it's types Star topology, Ring topology, Bus topology an...Network Topology and it's types Star topology, Ring topology, Bus topology an...
Network Topology and it's types Star topology, Ring topology, Bus topology an...
 
Types of Network Topologies
Types of Network TopologiesTypes of Network Topologies
Types of Network Topologies
 
Network topology
Network topologyNetwork topology
Network topology
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Networks topologies Lec#2
Networks topologies Lec#2Networks topologies Lec#2
Networks topologies Lec#2
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
7 topology ethernet
7 topology ethernet7 topology ethernet
7 topology ethernet
 
Network topology
Network topologyNetwork topology
Network topology
 
Network Topology and its types
Network Topology and its typesNetwork Topology and its types
Network Topology and its types
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network topology
Network topologyNetwork topology
Network topology
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network topology by ananya shukla
Network topology by ananya shuklaNetwork topology by ananya shukla
Network topology by ananya shukla
 

Similar to Network topology

Network, Topology and iits types
Network, Topology and iits typesNetwork, Topology and iits types
Network, Topology and iits typesMuzaffar Salik
 
Cables and networks
Cables  and networksCables  and networks
Cables and networksM Umer Jawad
 
B.sc i agri u 5 data communication and network
B.sc i agri u 5 data communication and networkB.sc i agri u 5 data communication and network
B.sc i agri u 5 data communication and networkRai University
 
B.sc i micro bio u 5 data communication and network
B.sc i micro bio u 5 data communication and networkB.sc i micro bio u 5 data communication and network
B.sc i micro bio u 5 data communication and networkRai University
 
B.sc i bio tech u 5 data communication and network
B.sc i bio tech u 5 data communication and networkB.sc i bio tech u 5 data communication and network
B.sc i bio tech u 5 data communication and networkRai University
 
B.sc i cs u 5 data communication and network
B.sc i cs u 5 data communication and networkB.sc i cs u 5 data communication and network
B.sc i cs u 5 data communication and networkRai University
 
B.sc i bio chem u 5 data communication and network
B.sc i bio chem u 5 data communication and networkB.sc i bio chem u 5 data communication and network
B.sc i bio chem u 5 data communication and networkRai University
 
network essential ppt
network essential pptnetwork essential ppt
network essential pptVikas Tiwari
 
Network Topology
Network TopologyNetwork Topology
Network TopologyAmshalEjaz1
 
NETWORK TOPOLOGY
NETWORK TOPOLOGYNETWORK TOPOLOGY
NETWORK TOPOLOGYKak Yong
 
Chapter3-4 Networks Topologies and Devices.ppt
Chapter3-4 Networks Topologies and Devices.pptChapter3-4 Networks Topologies and Devices.ppt
Chapter3-4 Networks Topologies and Devices.ppttahaniali27
 

Similar to Network topology (20)

Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
NETWORK TOPOLOGIES
NETWORK TOPOLOGIESNETWORK TOPOLOGIES
NETWORK TOPOLOGIES
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Network, Topology and iits types
Network, Topology and iits typesNetwork, Topology and iits types
Network, Topology and iits types
 
Cables and networks
Cables  and networksCables  and networks
Cables and networks
 
B.sc i agri u 5 data communication and network
B.sc i agri u 5 data communication and networkB.sc i agri u 5 data communication and network
B.sc i agri u 5 data communication and network
 
B.sc i micro bio u 5 data communication and network
B.sc i micro bio u 5 data communication and networkB.sc i micro bio u 5 data communication and network
B.sc i micro bio u 5 data communication and network
 
B.sc i bio tech u 5 data communication and network
B.sc i bio tech u 5 data communication and networkB.sc i bio tech u 5 data communication and network
B.sc i bio tech u 5 data communication and network
 
B.sc i cs u 5 data communication and network
B.sc i cs u 5 data communication and networkB.sc i cs u 5 data communication and network
B.sc i cs u 5 data communication and network
 
B.sc i bio chem u 5 data communication and network
B.sc i bio chem u 5 data communication and networkB.sc i bio chem u 5 data communication and network
B.sc i bio chem u 5 data communication and network
 
network essential ppt
network essential pptnetwork essential ppt
network essential ppt
 
Topology.pptx
Topology.pptxTopology.pptx
Topology.pptx
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Networking report
Networking reportNetworking report
Networking report
 
Networking
NetworkingNetworking
Networking
 
NETWORK TOPOLOGY
NETWORK TOPOLOGYNETWORK TOPOLOGY
NETWORK TOPOLOGY
 
Topology
TopologyTopology
Topology
 
topologies
topologiestopologies
topologies
 
3.1.1 network topology complete
3.1.1 network topology complete3.1.1 network topology complete
3.1.1 network topology complete
 
Chapter3-4 Networks Topologies and Devices.ppt
Chapter3-4 Networks Topologies and Devices.pptChapter3-4 Networks Topologies and Devices.ppt
Chapter3-4 Networks Topologies and Devices.ppt
 

More from Tapesh Chalisgaonkar (16)

Recreated polyfuse
Recreated polyfuseRecreated polyfuse
Recreated polyfuse
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 
Gifi state
Gifi stateGifi state
Gifi state
 
Sky x technology
Sky x technologySky x technology
Sky x technology
 
Gi fi technology finl ppt
Gi fi technology finl pptGi fi technology finl ppt
Gi fi technology finl ppt
 
Win8 seminar
Win8 seminarWin8 seminar
Win8 seminar
 
Blue eye
Blue eyeBlue eye
Blue eye
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
cloud computing
 cloud computing cloud computing
cloud computing
 
Main file win 8
Main file win 8Main file win 8
Main file win 8
 
Win8osnew
Win8osnewWin8osnew
Win8osnew
 
Mobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarMobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh Chalisgaonkar
 
Mobile commerce ppt
Mobile commerce pptMobile commerce ppt
Mobile commerce ppt
 
m-commerce-seminar-report
 m-commerce-seminar-report m-commerce-seminar-report
m-commerce-seminar-report
 
Energy from the sun
Energy from the sunEnergy from the sun
Energy from the sun
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 

Recently uploaded

Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 

Recently uploaded (20)

Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 

Network topology

  • 3. At the end of this lesson, student should be able to achieve all the three objective below:- OBJECTIVE MAIN MENU SUMMARY EXITEXERCISECONTENT At the end of this lesson, student should be able to achieve all the three objective below:- Explain meaning of network topology with correctly. State three types of network topologies correctly. Differentiate correctly between the three types of network topology.
  • 4. CONTENT MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE Definition of Network Topology Types of Network Topology Differentiation Between the Types of Network Topology
  • 5. DEFINITION What is a Topology ? The physical topology of a network refers to the configuration of cables, computers and other peripherals. MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
  • 6. TYPES OF NETWORK TOPOLOGY Three commonly used network topologies are:- Bus network. Ring network. Star network. MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
  • 7. BUS TOPOLOGY All computers and devices connected to central cable or bus. Consists of a main run of cable with a terminator at each end. Popular on LANs because they are inexpensive and easy to install. MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
  • 8. BUS TOPOLOGY MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
  • 9. BUS TOPOLOGY MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
  • 10. RING TOPOLOGY Cable forms closed ring or loop, with all computers and devices arranged along ring. Data travels from device to device around entire ring, in one direction. Primarily is used for LANs, but also is used in WANs. MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
  • 11. RING TOPOLOGY MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
  • 12. STAR TOPOLOGY All devices connect to a central device, called hub. All data transferred from one computer to another passes through hub. MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
  • 13. STAR TOPOLOGY MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
  • 14. STAR TOPOLOGY MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE
  • 15. DIFFERENTIATION BETWEEN THE THREE TYPES OF NETWORK TOPOLOGY MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE WHAT IS DIFFERENTIATION BETWEEN THE THREE OF NETWORK TOPOLOGY? SEARCH IN THE INTERNET
  • 16. DIFFERENTIATION BETWEEN THE THREE TYPES OF NETWORK TOPOLOGY MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE http://en.wikipedia.org/wiki/Network_topology http://home.att.net/~charlie.net/cMctopology.htm
  • 17. DIFFERENTIATION BETWEEN THE THREE TYPES OF NETWORK TOPOLOGY MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE ADVANTAGE DISADVANTAGE 1) Easy to connect computer or peripheral to a linear bus. 1) Entire network shuts down if there is a break in the main cable. 2) Requires less cable length than a star topology. 2) Terminators are required at both ends of the backbone cable. 3) Difficult to identify the problem if the entire network shuts down. BUS
  • 18. DIFFERENTIATION BETWEEN THE THREE TYPES OF NETWORK TOPOLOGY MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE ADVANTAGE DISADVANTAGE 1) Data is quickly transferred without a ‘bottle neck’. 1) Data packets must pass through every computer between the sender and recipient therefore, this makes it slower. 2) The transmission of data is relatively simple as packets travel in one direction only. 2) If any of the nodes fail then the ring is broken and data cannot be transmitted successfully. 3) It is difficult to troubleshoot the ring. RING
  • 19. DIFFERENTIATION BETWEEN THE THREE TYPES OF NETWORK TOPOLOGY MAIN MENU SUMMARY EXITEXERCISEOBJECTIVE ADVANTAGE DISADVANTAGE 1) Easy to install and wire. 1) Requires more cable length than a linear topology. 2) Security can be implemented in the hub/switch. 2) If the hub or concentrator fails, nodes attached are disabled. 3) Easy to detect faults and to remove parts. 3) More expensive than linear bus topologies because of the cost of the concentrators. STAR
  • 20. EXERCISE MAIN MENU SUMMARY EXITCONTENTOBJECTIVE 1) Which of the following statements describe about network topology correctly ? A. Devices attached or detached at any point on the network. B. The failure of device on the network. C. Refers to the configuration of cables, computers and other peripherals. D. All of the above.
  • 21. EXERCISE MAIN MENU SUMMARY EXITCONTENTOBJECTIVE 2)On a __________, all of the computers and devices (nodes) on the network connect to a central device. A. Bus network. B. Ring network. C. Star network. D. All of above.
  • 22. EXERCISE MAIN MENU SUMMARY EXITCONTENTOBJECTIVE 3)On a star network, the central device that provides a common connection point for nodes on the network is called the __________. A. Hub. B. Personal computer. C. Printer. D. File server.
  • 23. EXERCISE MAIN MENU SUMMARY EXITCONTENTOBJECTIVE 4) On a bus network, such as that illustrated in the accompanying figure, if one node fails ________. A. Only that node is affected. B. Only the nodes before that node are affected. C. Only the nodes after that node are affected. D. All the nodes are affected.
  • 24. EXERCISE MAIN MENU SUMMARY EXITCONTENTOBJECTIVE The transmission of data is relatively simple as packets travel in one direction only. 5) The statement above is correctly refer to the ______. A. Bus network. B. Ring network. C. Star network. D. All of the above.
  • 25. EXERCISE MAIN MENU SUMMARY EXITCONTENTOBJECTIVE 6) All the statements true about ring topology except A. Data is quickly transferred without a ‘bottle neck’. B. The transmission of data is relatively simple as packets travel in one direction only. C. If any of the nodes fail then the ring is broken and data cannot be transmitted successfully. D. Security can be implemented in the hub/switch.
  • 26. EXERCISE MAIN MENU SUMMARY EXITCONTENTOBJECTIVE 7) The statement true about star topology is A. Difficult to identify the problem if the entire network shuts down. B. Terminators are required at both ends of the backbone cable. C. The transmission of data is relatively simple as packets travel in one direction only. D. Easy to detect faults and to remove parts.
  • 27. ANSWER MAIN MENU SUMMARY EXITCONTENTOBJECTIVE YOU ANSWER IS WRONG, TRY AGAIN !!! QUESTION 1 QUESTION 2 QUESTION 3 QUESTION 4 QUESTION 5 QUESTION 6 QUESTION 7
  • 28. ANSWER YOU ANSWER IS CORRECT !!! QUESTION 1 QUESTION 2 QUESTION 3 QUESTION 4 QUESTION 5 QUESTION 6 QUESTION 7 MAIN MENU SUMMARY EXITCONTENTOBJECTIVE
  • 29. SUMMARY MAIN MENU EXERCISE EXITCONTENTOBJECTIVE BUS TOPOLOGY DEFINITION •All computers and devices connected to central cable ADVANTAGE •Easy to connect a computer or peripheral to a linear bus. •Requires less cable length than a star topology. DISADVANTAGE •Entire network shuts down if there is a break in the main cable. •Terminators are required at both ends of the backbone cable. •Difficult to identify the problem if the entire network shuts down.
  • 30. SUMMARY RING TOPOLOGY DEFINITION •Cable forms closed ring or loop, with all computers and devices arranged along ring. ADVANTAGE •Data is quickly transferred without a ‘bottle neck’. •The transmission of data is relatively simple as packets travel in one direction only. DISADVANTAGE •Data packets must pass through every computer between the sender and recipient therefore, this makes it slower. •If any of the nodes fail then the ring is broken and data cannot be transmitted successfully. •It is difficult to troubleshoot the ring. MAIN MENU EXERCISE EXITCONTENTOBJECTIVE
  • 31. SUMMARY DEFINITION •All devices connect to a central device, called hub. ADVANTAGE •Easy to install and wire. •Security can be implemented in the hub/switch. DISADVANTAGE •Requires more cable length than a linear topology. If the hub or concentrator fails, nodes attached are disabled. More expensive than linear bus topologies because of the cost of the concentrators. STAR TOPOLOGY •Easy to detect faults and to remove parts MAIN MENU EXERCISE EXITCONTENTOBJECTIVE
  • 32. ARE YOU SURE TO EXIT ? YES NO