SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Network Topology & Design
Chapter 4
Networking Essentials – Eric Vanderburg © 2005
Bus topology


Bus topology advantages






Inexpensive
Easy to design
Easy to implement

Bus topology disadvantages



Difficult to troubleshoot
Requires termination
Star topology


Star topology advantages







Break in one cable does not
affect other devices (except up links)
Easy to locate problems
Easy to install
Does not require termination like bus
topology

Star topology disadvantages




Center of star topology device (hub) can be
expensive
Hub failure can affect entire topology
Amount of cable is expensive
Ring topology


Ring topology advantages
Prevents network collisions
 Each station acts like a repeater




Ring topology disadvantages
Cable break can affect all devices
 Temporarily shut down network to add a
new station
 Maintenance and monitoring is difficult

Network Architecture


IEEE 802
CSMA/CD (802.3)
 Token Ring (802.5)


 NADN (Nearest Active Downstream

Neighbor)
 NAUN (Nearest Active Upstream Neighbor)
 Node with the token can send data
 Predictable send/receive time

Wireless Technologies (802.11)
 FDDI (Fiber Distributed Data Interface)

Media


Twisted-Pair cabling have the following
in common
Copper based data transmission
 Copper wires come in pairs
 Each Wire of a pair is twisted around each
other to protect against NEXT (Near End
Crosstalk)
 Copper wires are enclosed in a sheath
 All wire pairs are enclosed in a sheath

Media (continued)


UTP (Unshielded twisted-pair)


Advantages of UTP cable








Disadvantages of UTP cable





Thin and flexible
Easy to install
Many modern buildings come with CAT 5 installed
Small size does not fill up wiring ducts fast
Inexpensive per foot
Susceptible to interference
Cable length is 100 meters or 328 feet

RJ (Register Jacks)


RJ-45
Media (continued)
Media (continued)


STP (Shielded twisted-pair)


Advantages of STP cable






Greater protection from interference
Thin and flexible
Overall it is easy to install

Disadvantages of STP cable






Inexpensive per foot but more than UTP
STP must be grounded, problems exists if not grounded
properly
More difficult to install than UTP
Small size but does fill up wiring ducts faster than UTP
Media (continued)


Coaxial cabling (Thicknet and Thinnet)


Advantages of coaxial cabling






Cable lengths are longer than UTP/STP
Less susceptible to interference than UTP
Hubs are not required, direct connection

Disadvantages of coaxial cabling




Thicknet is very difficult to install
More expensive than UTP
Difficult to troubleshoot
Media (continued)


Thinnet and Thicknet Connectors
RG-58 cabling
 BNC
 AUI (Attachment unit interface)
 Barrel connectors
 T-connectors
 Terminators

Media (continued)


Fiber-Optic cable


Advantages of fiberoptic cabling

Transmit data over long
distances
 Not susceptible to EMI
 High transmission rates
 Not susceptible to
eavesdropping
 Small cable size
Disadvantages of fiber-optic cabling









Expensive
Cable can be easily damaged during install making installations more
difficult
Manual termination of ends is time consuming
Fiber Optic Connectors
ST (Straight Tip)

LC (Link Control)

SC (Straight
Connection)

MIC (Medium Interface Connector)

MT-RJ
two cables in one
RJ-45 clone

SMA (Subminiature Type A)
Signal Degradation (continued)


Reduce EMI/RFI


Do not place copper media next to
 Fluorescent

lights
 Generators/motors
 High-voltage electrical wire

Proper installation
 Use quality cable
 Use shielded cabling
 Use repeaters to strengthen signal on long
cable runs

Cabling
Horizontal Cabling – cables going from
the wiring closet to end nodes
 Vertical Cabling – Backbone of the
network

Wiring Closets




MDF (Main distribution
facility) – Central wiring
closet when more than
one is used
IDF (Intermediate
distribution facility) –
wiring closets off the
MDF
LAN Design Models


Two basic design strategies


Mesh
 all routers are peers,

interconnected, and
exchanging information
 Easy to set up


Hierarchical
 Easy

to troubleshoot
 Easier to manage
 Can scale better
 Can obtain better performance data
LAN Design Models


Three-layer network model
Core – WAN connectivity between sites
(usually owned by the ISP)
 Distribution – Connects buildings on the
LAN or wiring closets in a building
 Access layer – Connects nodes into the
network

Acronyms










AC, Alternating Current
AUI, Attachment Unit Interface
CMIP, Common Management Information
Protocol
EIA, Electronic Industries Alliance
TIA, Telecommunications Industry Association
FDDI, Fiber Distributed Data Interface
IDF, Intermediate Distribution Facility
MDF, Main Distribution Facility
MID, Management Information base
Acronyms










MAU, Multistation Access Unit
NEXT, Near End Crosstalk
NADN, Nearest Active Downstream Neighbor
NAUN, Nearest Active Upstream Neighbor
POP, Point of Presence
SAP, Service Access Point
STP, Shielded Twisted Pair
TDR, Time Domain Reflectometer
UTP, Unshielded Twisted Pair

Weitere ähnliche Inhalte

Was ist angesagt?

Computer Network topology
Computer Network topologyComputer Network topology
Computer Network topologyMuhammad Bilal
 
Topology presentation-sachin noire
Topology presentation-sachin noireTopology presentation-sachin noire
Topology presentation-sachin noiresachin kumar
 
Network topology....sajal
Network topology....sajalNetwork topology....sajal
Network topology....sajalSajal Das
 
Network topologies
Network topologiesNetwork topologies
Network topologiesNorah Saad
 
7 topology ethernet
7 topology ethernet7 topology ethernet
7 topology ethernetSamit Singh
 
fiber optic communication connectors
fiber optic communication connectors fiber optic communication connectors
fiber optic communication connectors Rana Kashif Hussain
 
Network topology
Network topologyNetwork topology
Network topologyilakkiya
 
TYPES OF COMPUTER NETWORK CABLES
TYPES OF COMPUTER NETWORK CABLES TYPES OF COMPUTER NETWORK CABLES
TYPES OF COMPUTER NETWORK CABLES Sayma Sultana
 
Network, Topology and iits types
Network, Topology and iits typesNetwork, Topology and iits types
Network, Topology and iits typesMuzaffar Salik
 
Network topology
Network topologyNetwork topology
Network topologyJency Pj
 
Network topologies
Network topologiesNetwork topologies
Network topologieszirram
 
BASIC NETWORKING TOPOLOGIES
BASIC NETWORKING TOPOLOGIESBASIC NETWORKING TOPOLOGIES
BASIC NETWORKING TOPOLOGIESKirti Garg
 
8 Common Network Topologies & Where to Use Them
8 Common Network Topologies & Where to Use Them8 Common Network Topologies & Where to Use Them
8 Common Network Topologies & Where to Use ThemAuvik Networks Inc.
 
Network topology
Network topologyNetwork topology
Network topologyVpmv
 

Was ist angesagt? (19)

Computer Network topology
Computer Network topologyComputer Network topology
Computer Network topology
 
Topology presentation-sachin noire
Topology presentation-sachin noireTopology presentation-sachin noire
Topology presentation-sachin noire
 
Network topology....sajal
Network topology....sajalNetwork topology....sajal
Network topology....sajal
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
7 topology ethernet
7 topology ethernet7 topology ethernet
7 topology ethernet
 
Network topology
Network topologyNetwork topology
Network topology
 
fiber optic communication connectors
fiber optic communication connectors fiber optic communication connectors
fiber optic communication connectors
 
Network topology
Network topologyNetwork topology
Network topology
 
Network topology
Network topologyNetwork topology
Network topology
 
TYPES OF COMPUTER NETWORK CABLES
TYPES OF COMPUTER NETWORK CABLES TYPES OF COMPUTER NETWORK CABLES
TYPES OF COMPUTER NETWORK CABLES
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Network, Topology and iits types
Network, Topology and iits typesNetwork, Topology and iits types
Network, Topology and iits types
 
Network topology
Network topologyNetwork topology
Network topology
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Hardware3
Hardware3Hardware3
Hardware3
 
BASIC NETWORKING TOPOLOGIES
BASIC NETWORKING TOPOLOGIESBASIC NETWORKING TOPOLOGIES
BASIC NETWORKING TOPOLOGIES
 
8 Common Network Topologies & Where to Use Them
8 Common Network Topologies & Where to Use Them8 Common Network Topologies & Where to Use Them
8 Common Network Topologies & Where to Use Them
 
Network topology
Network topologyNetwork topology
Network topology
 

Andere mochten auch

Sept 2017 network design
Sept 2017   network designSept 2017   network design
Sept 2017 network designshahin raj
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devicesKunal Bhansali
 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comPawan Sharma
 
ARCHINT: Hotel Design 1.0
ARCHINT: Hotel Design 1.0ARCHINT: Hotel Design 1.0
ARCHINT: Hotel Design 1.0ArchiEducPH
 
Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Saurav Pandey
 
Network proposal ppt
Network proposal pptNetwork proposal ppt
Network proposal pptFrankNitty II
 

Andere mochten auch (8)

Chapter1 rev1.0
Chapter1   rev1.0Chapter1   rev1.0
Chapter1 rev1.0
 
Sept 2017 network design
Sept 2017   network designSept 2017   network design
Sept 2017 network design
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devices
 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.com
 
ARCHINT: Hotel Design 1.0
ARCHINT: Hotel Design 1.0ARCHINT: Hotel Design 1.0
ARCHINT: Hotel Design 1.0
 
Cisco project ideas
Cisco   project ideasCisco   project ideas
Cisco project ideas
 
Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0
 
Network proposal ppt
Network proposal pptNetwork proposal ppt
Network proposal ppt
 

Ähnlich wie CCNA Routing and Switching Lesson 04 - Topology & Design - Eric Vanderburg

Computer Network Topology By Team_Community Connectors (Dept . of Sociology)
Computer Network Topology By Team_Community Connectors (Dept . of Sociology)Computer Network Topology By Team_Community Connectors (Dept . of Sociology)
Computer Network Topology By Team_Community Connectors (Dept . of Sociology)Suman Mia
 
Nodd's network basic
Nodd's network basicNodd's network basic
Nodd's network basicRanglaz
 
Networking
NetworkingNetworking
NetworkingRanglaz
 
Networking
NetworkingNetworking
NetworkingRanglaz
 
Networking
NetworkingNetworking
NetworkingRanglaz
 
Intro To Networking
Intro To NetworkingIntro To Networking
Intro To NetworkingPhil Ashman
 
Network Technology Presentation Bvh V01
Network Technology Presentation   Bvh V01Network Technology Presentation   Bvh V01
Network Technology Presentation Bvh V01TomMcNamara
 
BVH Network Technology Presentation
BVH   Network Technology PresentationBVH   Network Technology Presentation
BVH Network Technology PresentationTomMcNamara
 
5 intro to networking
5 intro to networking5 intro to networking
5 intro to networkingguest0f230cfc
 
5 intro to networking
5 intro to networking5 intro to networking
5 intro to networkingKhan Rahimeen
 
5 intro to networking
5 intro to networking5 intro to networking
5 intro to networkingAnuja Lad
 
Data network Fundamentals
Data network FundamentalsData network Fundamentals
Data network FundamentalsJed Concepcion
 
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdfaquazac
 
Open Elective MSE.pptx
Open Elective MSE.pptxOpen Elective MSE.pptx
Open Elective MSE.pptxathars248
 
transmission media in computer network
transmission media in computer networktransmission media in computer network
transmission media in computer networkAnsh Aggarwal
 

Ähnlich wie CCNA Routing and Switching Lesson 04 - Topology & Design - Eric Vanderburg (20)

Transmission media
Transmission mediaTransmission media
Transmission media
 
Computer Network Topology By Team_Community Connectors (Dept . of Sociology)
Computer Network Topology By Team_Community Connectors (Dept . of Sociology)Computer Network Topology By Team_Community Connectors (Dept . of Sociology)
Computer Network Topology By Team_Community Connectors (Dept . of Sociology)
 
Nodd's network basic
Nodd's network basicNodd's network basic
Nodd's network basic
 
Mod8
Mod8Mod8
Mod8
 
Networking
NetworkingNetworking
Networking
 
Networking
NetworkingNetworking
Networking
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Networking
NetworkingNetworking
Networking
 
Intro To Networking
Intro To NetworkingIntro To Networking
Intro To Networking
 
Network Technology Presentation Bvh V01
Network Technology Presentation   Bvh V01Network Technology Presentation   Bvh V01
Network Technology Presentation Bvh V01
 
BVH Network Technology Presentation
BVH   Network Technology PresentationBVH   Network Technology Presentation
BVH Network Technology Presentation
 
5 intro to networking
5 intro to networking5 intro to networking
5 intro to networking
 
5 intro to networking
5 intro to networking5 intro to networking
5 intro to networking
 
5 intro to networking
5 intro to networking5 intro to networking
5 intro to networking
 
Data network Fundamentals
Data network FundamentalsData network Fundamentals
Data network Fundamentals
 
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
 
Presentation7
Presentation7Presentation7
Presentation7
 
Network Topologies.pptx
Network Topologies.pptxNetwork Topologies.pptx
Network Topologies.pptx
 
Open Elective MSE.pptx
Open Elective MSE.pptxOpen Elective MSE.pptx
Open Elective MSE.pptx
 
transmission media in computer network
transmission media in computer networktransmission media in computer network
transmission media in computer network
 

Mehr von Eric Vanderburg

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumEric Vanderburg
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveEric Vanderburg
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgEric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Eric Vanderburg
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityEric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatEric Vanderburg
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEric Vanderburg
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology managementEric Vanderburg
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technologyEric Vanderburg
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEric Vanderburg
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challengesEric Vanderburg
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: RoboticsEric Vanderburg
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercisesEric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemEric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesEric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsEric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgEric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgEric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgEric Vanderburg
 

Mehr von Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Kürzlich hochgeladen

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 

Kürzlich hochgeladen (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

CCNA Routing and Switching Lesson 04 - Topology & Design - Eric Vanderburg

  • 1. Network Topology & Design Chapter 4 Networking Essentials – Eric Vanderburg © 2005
  • 2. Bus topology  Bus topology advantages     Inexpensive Easy to design Easy to implement Bus topology disadvantages   Difficult to troubleshoot Requires termination
  • 3. Star topology  Star topology advantages      Break in one cable does not affect other devices (except up links) Easy to locate problems Easy to install Does not require termination like bus topology Star topology disadvantages    Center of star topology device (hub) can be expensive Hub failure can affect entire topology Amount of cable is expensive
  • 4. Ring topology  Ring topology advantages Prevents network collisions  Each station acts like a repeater   Ring topology disadvantages Cable break can affect all devices  Temporarily shut down network to add a new station  Maintenance and monitoring is difficult 
  • 5. Network Architecture  IEEE 802 CSMA/CD (802.3)  Token Ring (802.5)   NADN (Nearest Active Downstream Neighbor)  NAUN (Nearest Active Upstream Neighbor)  Node with the token can send data  Predictable send/receive time Wireless Technologies (802.11)  FDDI (Fiber Distributed Data Interface) 
  • 6. Media  Twisted-Pair cabling have the following in common Copper based data transmission  Copper wires come in pairs  Each Wire of a pair is twisted around each other to protect against NEXT (Near End Crosstalk)  Copper wires are enclosed in a sheath  All wire pairs are enclosed in a sheath 
  • 7. Media (continued)  UTP (Unshielded twisted-pair)  Advantages of UTP cable       Disadvantages of UTP cable    Thin and flexible Easy to install Many modern buildings come with CAT 5 installed Small size does not fill up wiring ducts fast Inexpensive per foot Susceptible to interference Cable length is 100 meters or 328 feet RJ (Register Jacks)  RJ-45
  • 9. Media (continued)  STP (Shielded twisted-pair)  Advantages of STP cable     Greater protection from interference Thin and flexible Overall it is easy to install Disadvantages of STP cable     Inexpensive per foot but more than UTP STP must be grounded, problems exists if not grounded properly More difficult to install than UTP Small size but does fill up wiring ducts faster than UTP
  • 10. Media (continued)  Coaxial cabling (Thicknet and Thinnet)  Advantages of coaxial cabling     Cable lengths are longer than UTP/STP Less susceptible to interference than UTP Hubs are not required, direct connection Disadvantages of coaxial cabling    Thicknet is very difficult to install More expensive than UTP Difficult to troubleshoot
  • 11. Media (continued)  Thinnet and Thicknet Connectors RG-58 cabling  BNC  AUI (Attachment unit interface)  Barrel connectors  T-connectors  Terminators 
  • 12. Media (continued)  Fiber-Optic cable  Advantages of fiberoptic cabling Transmit data over long distances  Not susceptible to EMI  High transmission rates  Not susceptible to eavesdropping  Small cable size Disadvantages of fiber-optic cabling      Expensive Cable can be easily damaged during install making installations more difficult Manual termination of ends is time consuming
  • 13. Fiber Optic Connectors ST (Straight Tip) LC (Link Control) SC (Straight Connection) MIC (Medium Interface Connector) MT-RJ two cables in one RJ-45 clone SMA (Subminiature Type A)
  • 14. Signal Degradation (continued)  Reduce EMI/RFI  Do not place copper media next to  Fluorescent lights  Generators/motors  High-voltage electrical wire Proper installation  Use quality cable  Use shielded cabling  Use repeaters to strengthen signal on long cable runs 
  • 15. Cabling Horizontal Cabling – cables going from the wiring closet to end nodes  Vertical Cabling – Backbone of the network 
  • 16. Wiring Closets   MDF (Main distribution facility) – Central wiring closet when more than one is used IDF (Intermediate distribution facility) – wiring closets off the MDF
  • 17. LAN Design Models  Two basic design strategies  Mesh  all routers are peers, interconnected, and exchanging information  Easy to set up  Hierarchical  Easy to troubleshoot  Easier to manage  Can scale better  Can obtain better performance data
  • 18. LAN Design Models  Three-layer network model Core – WAN connectivity between sites (usually owned by the ISP)  Distribution – Connects buildings on the LAN or wiring closets in a building  Access layer – Connects nodes into the network 
  • 19. Acronyms          AC, Alternating Current AUI, Attachment Unit Interface CMIP, Common Management Information Protocol EIA, Electronic Industries Alliance TIA, Telecommunications Industry Association FDDI, Fiber Distributed Data Interface IDF, Intermediate Distribution Facility MDF, Main Distribution Facility MID, Management Information base
  • 20. Acronyms          MAU, Multistation Access Unit NEXT, Near End Crosstalk NADN, Nearest Active Downstream Neighbor NAUN, Nearest Active Upstream Neighbor POP, Point of Presence SAP, Service Access Point STP, Shielded Twisted Pair TDR, Time Domain Reflectometer UTP, Unshielded Twisted Pair