SlideShare a Scribd company logo
Introduction to Computer
Lecture # 14
Course Instructor : Sehrish Rafiq
Department Of Computer Science
University Of Peshawar
Lecture overview
 Topology
 Mesh
 Star
 Tree
 Ring
 Bus
Topology
 The term topology refers to the way a network is laid out, either
physically or logically.
 Two or more devices connect to a link.
 Two or more links form a topology.
 The topology of a network is the geometric representation of the
relationship of all the links and linking devices(usually called nodes)
to each other.
 The topology describes that how the devices in a network are
interconnected rather than their physical arrangement.
Continued…
 A consideration when choosing a topology is the relative status of the
devices to be linked.
 Two relationships are possible.
Peer-to-Peer: where the devices share the link equally.
Primary-Secondary: where one device controls traffic and the others
can transmit through it.
 Five basic topologies
 Bus
 Star
 Mesh
 Tree
 Ring
 Note: Ring & Mesh topologies are more convenient for Peer-to-Peer transmission while
star & Tree topologies are better for primary–secondary transmission. A bus topology is
convenient for either.
Mesh topology
Mesh Topology
 In mesh topology every device has a dedicated point-to-point
link to every other device.
 The term dedicated means that the link carries traffic only
between the two devices it connects.
 A fully connected mesh network has n(n-1)/2 physical channels
to link n devices and every device must have n-1 I/O ports.
Advantages & Disadvantages
 Advantages:
 Each connection can carry its own data load.
 This topology is robust. If one link becomes unusable, it does not affect the entire
system.
 Privacy or security
 Easy fault identification.
 Disadvantages:
 Large amount of cabling & I/O ports are required.
 Installation & reconfiguration are difficult because every device must be connected
to every other device.
 The bulk of wiring can be greater than the available space( in walls, ceilings or
floors) can accommodate.
 The hardware(I/O ports & cabling) required to make a fully connected mesh network
can be prohibitively expensive.
Star Topology
 Each device has a dedicated point-to-point link only to a central
controller usually called a hub.
 The devices are not directly connected to each other.
 Like mesh a star topology does not allow direct traffic between
devices.
Continued…
 If one device wants to send data to another, It sends data to the
controller which then relays the data to the other connected device.
 Usually two types of Hubs are available.
 Passive Hub
 Active Hub
Types of Hubs
 Passive Hub:
 A passive Hub is used to connect computers in a broadcast network.
 The signal sent to a passive hub is sent to all workstations without any
regeneration or amplification.
 Passive hubs do not require any external power source.
 Active Hub:
 An active hub uses an external power source and regenerates the signal,
therefore greater cable distances are allowed.
 A switched hub directs the signal directly to the recipient.
 Active hubs also contain diagnostic features to aid in network trouble
shooting.
 Active Hub is more expensive than a passive Hub.
Advantages & Disadvantages
 Advantages
 A star topology is less expensive than a mesh topology.
 Each device needs only one cable and one I/O port to connect with any number of
devices.
 Easy to install and easy to reconfigure.
 Far less cabling is required therefore space problems are rare.
 Addition, deletions and moves involve only one connection between that device and
hub.
 If a link fails only that link is affected.
 Easy fault identification & fault isolation because of central Hub.
 Disadvantages
 More cabling than any other topology(such as bus, ring or tree ) except Mesh
because every device must be connected to the central hub.
 Active hub is expensive.
 A central hub failure can damage the whole network.
Tree Topology
Tree Topology
 A variation of star topology.
 As in star, nodes in a tree are linked to a central Hub that controls
the traffic to the Network.
 However, not every device is directly plugged in to the central Hub.
 The majority of the devices connect to a secondary Hub that in turn
is connected to the central Hub.
 The central Hub in the tree is an active Hub.
Continued…
 An active Hub contains a repeater which is a hardware device that
regenerates the received bit patterns before sending them out.
 Repeating strengthens transmissions and increases the distance a
signal can travel.
 The secondary Hubs may be active or passive hubs.
 A passive Hub provides a simple physical connection between the
attached devices.
Advantages & Disadvantages
 The advantages and disadvantages of tree are almost the same to
that of star.
 However, because of the addition of secondary Hubs more devices
can be connected with the central Hub and can increase the
distance a signal can travel.
 It allows the network to isolate and prioritize communications from
different computers.
 By means of prioritizing, the network designers and operator can
guarantee that time-sensitive data will not have to wait for access to
the network.
Bus Topology
 A Bus topology is a multipoint.
 One long cable acts as a backbone to link all the devices in a
network.
 Nodes are connected to the bus cable by drop lines and taps.
 A drop line is a connection running between the device and the
main cable.
 A tap is a connector that either splices in to the main cable or
punctures the sheathing of a cable to create a contact with the
metallic core.
Continued…
 As a signal travels along the back-bone, some of its energy is
transformed in to heat.
 Therefore it becomes weaker and weaker.
 For this reason there is a limit on the number of taps a bus can
support and on the distance between those taps.
Advantages & Disadvantages
 Advantages:
 Ease of installation.
 Less cabling than mesh, star or tree.
 Only one backbone cable stretches through the entire facility.
 For n devices to connect only one backbone cable and n drop lines are needed.
 Disadvantages:
 Difficult reconfiguration and fault isolation.
 It can be difficult to add new devices.
 Signal reflection problem.
 Adding new devices may require replacement of the backbone.
 A fault in backbone can damage the entire network causing noise problems in both
directions.
Ring Topology
 In ring topology every device has a dedicated point to point line
configuration only with the two devices on either side of it.
 A signal is passed along the ring in one direction from device to
device until it reaches its destination.
 Each device in the ring incorporates a repeater.
 Token passing is frequently used in ring topology.
Advantages & Disadvantages
 Advantages:
 Easy to install and easy to reconfigure.
 Adding and deleting a device only involves two connections.
 Easy fault isolation.
 If one device does not receive a signal within a specified period, it can issue an
alarm.
 Disadvantage:
 Uni-directional traffic.
 A break in a ring can disable the entire network.
 This weakness can be solved by a dual ring.
Hybrid Topologies
 Often a network combines several topologies as sub-networks
linked together in a large topology.
 For example, one department of a business may have decided to
use a bus topology while another department has a ring.
 All can be connected with a central controller in a star topology.
Introduction to Computers Lecture # 14
Ad

More Related Content

What's hot (20)

network hardware
network hardwarenetwork hardware
network hardware
tumetr1
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
Shovan Mandal
 
Data communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesData communication and computer networks | Network Topologies
Data communication and computer networks | Network Topologies
MSA Technosoft
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabha
Suprabha Sahoo
 
Presentation on computer networking
Presentation on computer networkingPresentation on computer networking
Presentation on computer networking
Jyoti Tewari
 
Network devices
Network devicesNetwork devices
Network devices
Dhani Ahmad
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Rutwik Jadhav
 
Data communication and computer networks
Data communication and computer networksData communication and computer networks
Data communication and computer networks
marwa_ma
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
Khan Rahimeen
 
Presentation on data communication
Presentation on data communicationPresentation on data communication
Presentation on data communication
Harpreet Dhaliwal
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
Haider Ali Malik
 
Data Communication Networks
Data Communication NetworksData Communication Networks
Data Communication Networks
Yash Gupta
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
UMaine
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
LakshyaT
 
Data com chapter 1 introduction
Data com chapter 1   introductionData com chapter 1   introduction
Data com chapter 1 introduction
Abdul-Hamid Donde
 
types of computer networks, protocols and standards
types of computer networks, protocols and standardstypes of computer networks, protocols and standards
types of computer networks, protocols and standards
Midhun Menon
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
vasanthimuniasamy
 
networking
networkingnetworking
networking
Pooja Dhiman
 
introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networking
Sithu PM
 
Data communication and network
Data communication and networkData communication and network
Data communication and network
Hardik Patel
 
network hardware
network hardwarenetwork hardware
network hardware
tumetr1
 
Data communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesData communication and computer networks | Network Topologies
Data communication and computer networks | Network Topologies
MSA Technosoft
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabha
Suprabha Sahoo
 
Presentation on computer networking
Presentation on computer networkingPresentation on computer networking
Presentation on computer networking
Jyoti Tewari
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Rutwik Jadhav
 
Data communication and computer networks
Data communication and computer networksData communication and computer networks
Data communication and computer networks
marwa_ma
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
Khan Rahimeen
 
Presentation on data communication
Presentation on data communicationPresentation on data communication
Presentation on data communication
Harpreet Dhaliwal
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
Haider Ali Malik
 
Data Communication Networks
Data Communication NetworksData Communication Networks
Data Communication Networks
Yash Gupta
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
UMaine
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
LakshyaT
 
Data com chapter 1 introduction
Data com chapter 1   introductionData com chapter 1   introduction
Data com chapter 1 introduction
Abdul-Hamid Donde
 
types of computer networks, protocols and standards
types of computer networks, protocols and standardstypes of computer networks, protocols and standards
types of computer networks, protocols and standards
Midhun Menon
 
introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networking
Sithu PM
 
Data communication and network
Data communication and networkData communication and network
Data communication and network
Hardik Patel
 

Similar to Introduction to Computers Lecture # 14 (20)

Network Topology In Computer Network 6-Types of topologies.pdf
Network Topology In Computer Network  6-Types of topologies.pdfNetwork Topology In Computer Network  6-Types of topologies.pdf
Network Topology In Computer Network 6-Types of topologies.pdf
sunil shukla
 
Network topology
Network topologyNetwork topology
Network topology
Student
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
Md Ashikur Rahman
 
Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01
Sayyed Nawaz
 
Network topology
Network topologyNetwork topology
Network topology
Nafizul Islam
 
Topology munsifullah daudzaikhurasan university
Topology munsifullah daudzaikhurasan university Topology munsifullah daudzaikhurasan university
Topology munsifullah daudzaikhurasan university
Munsif Ullah
 
COMPUTER NETWORK TOPOLOGY
COMPUTER NETWORK TOPOLOGY COMPUTER NETWORK TOPOLOGY
COMPUTER NETWORK TOPOLOGY
Sayma Sultana
 
Network Topology
Network TopologyNetwork Topology
Network Topology
Malik Mehrose
 
Presentation on topology
Presentation on topologyPresentation on topology
Presentation on topology
kalyan kumar
 
Presentation on topology by kalyan kk
Presentation on topology by kalyan kkPresentation on topology by kalyan kk
Presentation on topology by kalyan kk
kalyan kumar
 
report.pptx
report.pptxreport.pptx
report.pptx
KlieanUriarte
 
Topology
Topology Topology
Topology
tanvirahmed638
 
Network topology
Network topologyNetwork topology
Network topology
ArjonDando1
 
Network Topologies in computer networking
Network Topologies in computer networkingNetwork Topologies in computer networking
Network Topologies in computer networking
nazmulabdal
 
1. UNIT I-INTRODUCTION TO DATA COMMUNICATIONS AND NETWORKING.ppsx
1. UNIT I-INTRODUCTION TO DATA COMMUNICATIONS AND NETWORKING.ppsx1. UNIT I-INTRODUCTION TO DATA COMMUNICATIONS AND NETWORKING.ppsx
1. UNIT I-INTRODUCTION TO DATA COMMUNICATIONS AND NETWORKING.ppsx
radha452880
 
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
SuratSingh18
 
Networktopology xii
Networktopology xiiNetworktopology xii
Networktopology xii
saltyp
 
Types of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterTypes of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouter
AlidHasan4
 
Topology
TopologyTopology
Topology
Burhan Ahmed
 
Network topology
Network topologyNetwork topology
Network topology
lekshmik
 
Network Topology In Computer Network 6-Types of topologies.pdf
Network Topology In Computer Network  6-Types of topologies.pdfNetwork Topology In Computer Network  6-Types of topologies.pdf
Network Topology In Computer Network 6-Types of topologies.pdf
sunil shukla
 
Network topology
Network topologyNetwork topology
Network topology
Student
 
Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01
Sayyed Nawaz
 
Topology munsifullah daudzaikhurasan university
Topology munsifullah daudzaikhurasan university Topology munsifullah daudzaikhurasan university
Topology munsifullah daudzaikhurasan university
Munsif Ullah
 
COMPUTER NETWORK TOPOLOGY
COMPUTER NETWORK TOPOLOGY COMPUTER NETWORK TOPOLOGY
COMPUTER NETWORK TOPOLOGY
Sayma Sultana
 
Presentation on topology
Presentation on topologyPresentation on topology
Presentation on topology
kalyan kumar
 
Presentation on topology by kalyan kk
Presentation on topology by kalyan kkPresentation on topology by kalyan kk
Presentation on topology by kalyan kk
kalyan kumar
 
Network topology
Network topologyNetwork topology
Network topology
ArjonDando1
 
Network Topologies in computer networking
Network Topologies in computer networkingNetwork Topologies in computer networking
Network Topologies in computer networking
nazmulabdal
 
1. UNIT I-INTRODUCTION TO DATA COMMUNICATIONS AND NETWORKING.ppsx
1. UNIT I-INTRODUCTION TO DATA COMMUNICATIONS AND NETWORKING.ppsx1. UNIT I-INTRODUCTION TO DATA COMMUNICATIONS AND NETWORKING.ppsx
1. UNIT I-INTRODUCTION TO DATA COMMUNICATIONS AND NETWORKING.ppsx
radha452880
 
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
SuratSingh18
 
Networktopology xii
Networktopology xiiNetworktopology xii
Networktopology xii
saltyp
 
Types of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterTypes of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouter
AlidHasan4
 
Network topology
Network topologyNetwork topology
Network topology
lekshmik
 
Ad

More from Sehrish Rafiq (20)

Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12
Sehrish Rafiq
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
Sehrish Rafiq
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10
Sehrish Rafiq
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9
Sehrish Rafiq
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8
Sehrish Rafiq
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7
Sehrish Rafiq
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4
Sehrish Rafiq
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5
Sehrish Rafiq
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3
Sehrish Rafiq
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2
Sehrish Rafiq
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1
Sehrish Rafiq
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16
Sehrish Rafiq
 
Lecture 24
Lecture 24Lecture 24
Lecture 24
Sehrish Rafiq
 
Lecture 18
Lecture 18Lecture 18
Lecture 18
Sehrish Rafiq
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
Sehrish Rafiq
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
Sehrish Rafiq
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
Sehrish Rafiq
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
Sehrish Rafiq
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
Sehrish Rafiq
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
Sehrish Rafiq
 
Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12
Sehrish Rafiq
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
Sehrish Rafiq
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10
Sehrish Rafiq
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9
Sehrish Rafiq
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8
Sehrish Rafiq
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7
Sehrish Rafiq
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4
Sehrish Rafiq
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5
Sehrish Rafiq
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3
Sehrish Rafiq
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2
Sehrish Rafiq
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1
Sehrish Rafiq
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16
Sehrish Rafiq
 
Ad

Recently uploaded (20)

Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
Build With AI - In Person Session Slides.pdf
Build With AI - In Person Session Slides.pdfBuild With AI - In Person Session Slides.pdf
Build With AI - In Person Session Slides.pdf
Google Developer Group - Harare
 
Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)
Kaya Weers
 
Agentic Automation - Delhi UiPath Community Meetup
Agentic Automation - Delhi UiPath Community MeetupAgentic Automation - Delhi UiPath Community Meetup
Agentic Automation - Delhi UiPath Community Meetup
Manoj Batra (1600 + Connections)
 
Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025
Damco Salesforce Services
 
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Vasileios Komianos
 
Secondary Storage for a microcontroller system
Secondary Storage for a microcontroller systemSecondary Storage for a microcontroller system
Secondary Storage for a microcontroller system
fizarcse
 
Building Connected Agents: An Overview of Google's ADK and A2A Protocol
Building Connected Agents:  An Overview of Google's ADK and A2A ProtocolBuilding Connected Agents:  An Overview of Google's ADK and A2A Protocol
Building Connected Agents: An Overview of Google's ADK and A2A Protocol
Suresh Peiris
 
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Wonjun Hwang
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
Cybersecurity Tools and Technologies - Microsoft Certificate
Cybersecurity Tools and Technologies - Microsoft CertificateCybersecurity Tools and Technologies - Microsoft Certificate
Cybersecurity Tools and Technologies - Microsoft Certificate
VICTOR MAESTRE RAMIREZ
 
Longitudinal Benchmark: A Real-World UX Case Study in Onboarding by Linda Bor...
Longitudinal Benchmark: A Real-World UX Case Study in Onboarding by Linda Bor...Longitudinal Benchmark: A Real-World UX Case Study in Onboarding by Linda Bor...
Longitudinal Benchmark: A Real-World UX Case Study in Onboarding by Linda Bor...
UXPA Boston
 
DNF 2.0 Implementations Challenges in Nepal
DNF 2.0 Implementations Challenges in NepalDNF 2.0 Implementations Challenges in Nepal
DNF 2.0 Implementations Challenges in Nepal
ICT Frame Magazine Pvt. Ltd.
 
How Top Companies Benefit from Outsourcing
How Top Companies Benefit from OutsourcingHow Top Companies Benefit from Outsourcing
How Top Companies Benefit from Outsourcing
Nascenture
 
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptxUiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
anabulhac
 
Top Hyper-Casual Game Studio Services
Top  Hyper-Casual  Game  Studio ServicesTop  Hyper-Casual  Game  Studio Services
Top Hyper-Casual Game Studio Services
Nova Carter
 
Slack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teamsSlack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teams
Nacho Cougil
 
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Alan Dix
 
Right to liberty and security of a person.pdf
Right to liberty and security of a person.pdfRight to liberty and security of a person.pdf
Right to liberty and security of a person.pdf
danielbraico197
 
Building a research repository that works by Clare Cady
Building a research repository that works by Clare CadyBuilding a research repository that works by Clare Cady
Building a research repository that works by Clare Cady
UXPA Boston
 
Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)
Kaya Weers
 
Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025
Damco Salesforce Services
 
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Vasileios Komianos
 
Secondary Storage for a microcontroller system
Secondary Storage for a microcontroller systemSecondary Storage for a microcontroller system
Secondary Storage for a microcontroller system
fizarcse
 
Building Connected Agents: An Overview of Google's ADK and A2A Protocol
Building Connected Agents:  An Overview of Google's ADK and A2A ProtocolBuilding Connected Agents:  An Overview of Google's ADK and A2A Protocol
Building Connected Agents: An Overview of Google's ADK and A2A Protocol
Suresh Peiris
 
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Wonjun Hwang
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
Cybersecurity Tools and Technologies - Microsoft Certificate
Cybersecurity Tools and Technologies - Microsoft CertificateCybersecurity Tools and Technologies - Microsoft Certificate
Cybersecurity Tools and Technologies - Microsoft Certificate
VICTOR MAESTRE RAMIREZ
 
Longitudinal Benchmark: A Real-World UX Case Study in Onboarding by Linda Bor...
Longitudinal Benchmark: A Real-World UX Case Study in Onboarding by Linda Bor...Longitudinal Benchmark: A Real-World UX Case Study in Onboarding by Linda Bor...
Longitudinal Benchmark: A Real-World UX Case Study in Onboarding by Linda Bor...
UXPA Boston
 
How Top Companies Benefit from Outsourcing
How Top Companies Benefit from OutsourcingHow Top Companies Benefit from Outsourcing
How Top Companies Benefit from Outsourcing
Nascenture
 
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptxUiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
anabulhac
 
Top Hyper-Casual Game Studio Services
Top  Hyper-Casual  Game  Studio ServicesTop  Hyper-Casual  Game  Studio Services
Top Hyper-Casual Game Studio Services
Nova Carter
 
Slack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teamsSlack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teams
Nacho Cougil
 
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Alan Dix
 
Right to liberty and security of a person.pdf
Right to liberty and security of a person.pdfRight to liberty and security of a person.pdf
Right to liberty and security of a person.pdf
danielbraico197
 
Building a research repository that works by Clare Cady
Building a research repository that works by Clare CadyBuilding a research repository that works by Clare Cady
Building a research repository that works by Clare Cady
UXPA Boston
 

Introduction to Computers Lecture # 14

  • 1. Introduction to Computer Lecture # 14 Course Instructor : Sehrish Rafiq Department Of Computer Science University Of Peshawar
  • 2. Lecture overview  Topology  Mesh  Star  Tree  Ring  Bus
  • 3. Topology  The term topology refers to the way a network is laid out, either physically or logically.  Two or more devices connect to a link.  Two or more links form a topology.  The topology of a network is the geometric representation of the relationship of all the links and linking devices(usually called nodes) to each other.  The topology describes that how the devices in a network are interconnected rather than their physical arrangement.
  • 4. Continued…  A consideration when choosing a topology is the relative status of the devices to be linked.  Two relationships are possible. Peer-to-Peer: where the devices share the link equally. Primary-Secondary: where one device controls traffic and the others can transmit through it.  Five basic topologies  Bus  Star  Mesh  Tree  Ring  Note: Ring & Mesh topologies are more convenient for Peer-to-Peer transmission while star & Tree topologies are better for primary–secondary transmission. A bus topology is convenient for either.
  • 6. Mesh Topology  In mesh topology every device has a dedicated point-to-point link to every other device.  The term dedicated means that the link carries traffic only between the two devices it connects.  A fully connected mesh network has n(n-1)/2 physical channels to link n devices and every device must have n-1 I/O ports.
  • 7. Advantages & Disadvantages  Advantages:  Each connection can carry its own data load.  This topology is robust. If one link becomes unusable, it does not affect the entire system.  Privacy or security  Easy fault identification.  Disadvantages:  Large amount of cabling & I/O ports are required.  Installation & reconfiguration are difficult because every device must be connected to every other device.  The bulk of wiring can be greater than the available space( in walls, ceilings or floors) can accommodate.  The hardware(I/O ports & cabling) required to make a fully connected mesh network can be prohibitively expensive.
  • 8. Star Topology  Each device has a dedicated point-to-point link only to a central controller usually called a hub.  The devices are not directly connected to each other.  Like mesh a star topology does not allow direct traffic between devices.
  • 9. Continued…  If one device wants to send data to another, It sends data to the controller which then relays the data to the other connected device.  Usually two types of Hubs are available.  Passive Hub  Active Hub
  • 10. Types of Hubs  Passive Hub:  A passive Hub is used to connect computers in a broadcast network.  The signal sent to a passive hub is sent to all workstations without any regeneration or amplification.  Passive hubs do not require any external power source.  Active Hub:  An active hub uses an external power source and regenerates the signal, therefore greater cable distances are allowed.  A switched hub directs the signal directly to the recipient.  Active hubs also contain diagnostic features to aid in network trouble shooting.  Active Hub is more expensive than a passive Hub.
  • 11. Advantages & Disadvantages  Advantages  A star topology is less expensive than a mesh topology.  Each device needs only one cable and one I/O port to connect with any number of devices.  Easy to install and easy to reconfigure.  Far less cabling is required therefore space problems are rare.  Addition, deletions and moves involve only one connection between that device and hub.  If a link fails only that link is affected.  Easy fault identification & fault isolation because of central Hub.  Disadvantages  More cabling than any other topology(such as bus, ring or tree ) except Mesh because every device must be connected to the central hub.  Active hub is expensive.  A central hub failure can damage the whole network.
  • 13. Tree Topology  A variation of star topology.  As in star, nodes in a tree are linked to a central Hub that controls the traffic to the Network.  However, not every device is directly plugged in to the central Hub.  The majority of the devices connect to a secondary Hub that in turn is connected to the central Hub.  The central Hub in the tree is an active Hub.
  • 14. Continued…  An active Hub contains a repeater which is a hardware device that regenerates the received bit patterns before sending them out.  Repeating strengthens transmissions and increases the distance a signal can travel.  The secondary Hubs may be active or passive hubs.  A passive Hub provides a simple physical connection between the attached devices.
  • 15. Advantages & Disadvantages  The advantages and disadvantages of tree are almost the same to that of star.  However, because of the addition of secondary Hubs more devices can be connected with the central Hub and can increase the distance a signal can travel.  It allows the network to isolate and prioritize communications from different computers.  By means of prioritizing, the network designers and operator can guarantee that time-sensitive data will not have to wait for access to the network.
  • 16. Bus Topology  A Bus topology is a multipoint.  One long cable acts as a backbone to link all the devices in a network.  Nodes are connected to the bus cable by drop lines and taps.  A drop line is a connection running between the device and the main cable.  A tap is a connector that either splices in to the main cable or punctures the sheathing of a cable to create a contact with the metallic core.
  • 17. Continued…  As a signal travels along the back-bone, some of its energy is transformed in to heat.  Therefore it becomes weaker and weaker.  For this reason there is a limit on the number of taps a bus can support and on the distance between those taps.
  • 18. Advantages & Disadvantages  Advantages:  Ease of installation.  Less cabling than mesh, star or tree.  Only one backbone cable stretches through the entire facility.  For n devices to connect only one backbone cable and n drop lines are needed.  Disadvantages:  Difficult reconfiguration and fault isolation.  It can be difficult to add new devices.  Signal reflection problem.  Adding new devices may require replacement of the backbone.  A fault in backbone can damage the entire network causing noise problems in both directions.
  • 19. Ring Topology  In ring topology every device has a dedicated point to point line configuration only with the two devices on either side of it.  A signal is passed along the ring in one direction from device to device until it reaches its destination.  Each device in the ring incorporates a repeater.  Token passing is frequently used in ring topology.
  • 20. Advantages & Disadvantages  Advantages:  Easy to install and easy to reconfigure.  Adding and deleting a device only involves two connections.  Easy fault isolation.  If one device does not receive a signal within a specified period, it can issue an alarm.  Disadvantage:  Uni-directional traffic.  A break in a ring can disable the entire network.  This weakness can be solved by a dual ring.
  • 21. Hybrid Topologies  Often a network combines several topologies as sub-networks linked together in a large topology.  For example, one department of a business may have decided to use a bus topology while another department has a ring.  All can be connected with a central controller in a star topology.
  翻译: