SlideShare a Scribd company logo
1 of 17
Download to read offline
Communication
Networks
- Overview of Data
Communication
[Part 2]
What you will learn in this video
•Effectiveness of
Data
Communication
•Components of
Data
Communication
Data
Communication
•Text
•Numbers
•Audio
•Video
Data
Representation
•Simplex
•Half Duplex
•Full Duplex
Flow of Data
•Requirements
•Physical Structure
•Topology
•Types of Network
Network Basics
Networks
A network is the
interconnection of a set
of devices capable of
communication
Criteria for Network:
A network must be able
to meet a certain
number of criteria. The
most important of these
are
• Performance,
• Reliability,
• Security.
Requirements of a Network
• Generally we can measure the performance using 2 factors
• Throughput - network throughput refers to how much data can
be transferred from source to destination within a given
timeframe. Throughput measures how many packets arrive at
their destinations successfully
• Delay – total time taken for a packet to reach the destination
from source.
Performance
• Network reliability is measured by the frequency of failure, the
time it takes a link to recover from a failure, and the network’s
robustness in a catastrophe.
Reliability
• Network security issues include protecting data from
unauthorized access, protecting data from damage and
development, and implementing policies and procedures for
recovery from breaches and data losses.
Security
Structure of a Network
• A network is two or more devices connected through links. A link is
a communications pathway that transfers data from one device to
another.
• There are two possible types of connections:
• Point-to-Point
• A point-to-point connection provides a dedicated link between two devices. The
entire capacity of the link is reserved for transmission between those two devices.
• Multipoint
• A multipoint (also called multidrop) connection is one in which more than two
specific devices share a single link. In a multipoint environment, the capacity of the
channel is shared, either spatially or temporally.
Network Topology
• The term physical topology refers to the way in which a network is
laid out physically.
• The topology of a network is the geometric representation of the
relationship of all the links and linking devices (usually called nodes)
to one another.
• There are four basic topologies possible:
Bus Star Ring Mesh
Bus Topology
• One long cable acts as a
backbone to link all the devices in
a network. Nodes are connected
to the bus cable by drop lines and
taps.
• A tap is a connector that either
splices into the main cable or
punctures the sheathing of a
cable to create a contact with the
metallic core.
• A drop line is a connection
running between the device and
the main cable.
Advantages of Bus Topology
1. Ease of installation.
2. Less cabling is required when compared to other
topologies
Disadvantages of Bus Topology
1. Difficult for reconnection and Fault Isolation
2. Adding of new devices is tedious
3. Degradation of signal quality due to taps
4. Cable termination is needed so as to avoid signal
reflection.
Star Topology
• In a star topology, each device
has a dedicated point-to-point
link only to a central controller,
usually called a hub.
• The devices are not directly
linked to one another. Star
topology does not allow direct
traffic between devices.
• The controller acts as an
exchange: If one device wants to
send data to another, it sends the
data to the controller, which then
relays the data to the other
connected device.
Advantages of Star Topology:
1. Less expensive.
2. Each device needs only one link and one I/O port to connect
it to a network.
3. Easy to install and reconfigure.
4. Less cabling is required
5. Robustness is high. If one link fails, only that link is
affected. All other links remain active.
Disadvantages of Star Topology:
1. Whole Topology depends on HUB. If the HUB goes down
then the entire network is down.
Ring Topology
❖In a ring topology, each device has
a dedicated point-to-point
connection with only the two devices
on either side of it.
❖A signal is passed along the ring in
one direction, from device to device,
until it reaches its destination.
❖Each device in the ring incorporates
a repeater.
❖When a device receives a signal
intended for another device, its
repeater regenerates the bits and
passes them along.
Advantages of Ring Topology:
1. Easy to install and reconfigure
2. Addition or deletion of a system in topology
only requires alteration at 2 points
3. Fault Identification is easier
Disadvantages of Ring Topology:
1. Supports only Unidirectional Traffic
2. Any break in the ring can disable the entire
network.
Mesh Topology
• In a mesh topology, every device has a
dedicated point-to-point link to every other
device.
• The term dedicated means that the link carries
traffic only between the two devices it
connects.
• The number of physical links in a fully
connected mesh network with n nodes, we need
n (n – 1) physical links (Simplex Links).
• However, if each physical link allows
communication in both directions (duplex
mode), we need n (n – 1) / 2 duplex-mode
links.
• To accommodate that many links, every device
on the network must have n – 1 input/output
(I/O) ports to be connected to the other n – 1
station.
Advantages of Mesh Topology:
1. Dedicated Links can carry their own load,
Sharing reduces the link capacity
2. Robust – Data is still delivered even if one
link is down.
3. Privacy and Security – No eavesdropping
4. Fault Identification is easier
Disadvantages of Mesh Topology:
1. Installation is difficult due to complex wiring
2. Requires more IO Ports to connect the
systems.
Network Topology - Summary
Bus Star Ring Mesh
Types of Networks
WAN
Wide Area Network
Hundreds and Thousands of Kilo Meters
MAN
Metropolitan Area Network
Tens of Kilo Meters
LAN
Local Area Network
Hundreds of Meters
PAN
Personal Area Network
Few Square Meters
Classification Based
on Size and Coverage
Classification Based
on Switching
Switching represents that how the message is
forwarded to the destination network or system
Circuit Switched
Network
Packet Switched
Network
Circuit Switched Networks
• They are widely used in the telephone networks.
• It first establishes a dedicated circuit across a sequence of links
• Then it allows source node to send a stream of bits across this circuit
to a destination
Packet Switched Networks
• These networks are widely used in most of the applications
• Messages are transmitted as packets
• They follow store and forward concept of transferring
packets
• Packets may take any route and they are routed by the
intermediate routers.
• These packets are rearranged at the receiver side.
• Many discrete networks are interconnected together to
form a internetwork or INTERNET.
• Nodes are addressed logically so that they can be
identified by the neighbouring devices in the network
• Packet transmission occurs in 3 modes, they are:
1. Unicast
2. Multicast
3. broadcast
Circuit Switched Vs Packet Switched
All the systems are connected
as Single network
Interconnections of Multiple
Networks
A heterogeneous network made of four
WANs and three LANs
References:
• Behrouz A. Forouzan, ―Data communication and Networking, Fifth
Edition, Tata McGraw – Hill, 2013
• Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems
Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011.
• Few online References (Will be Mentioned in the description Section)
Thank You…

More Related Content

What's hot

Packet switching
Packet switchingPacket switching
Packet switching
asimnawaz54
 
Transmission impairments(presentation)
Transmission impairments(presentation)Transmission impairments(presentation)
Transmission impairments(presentation)
Vivek Kumar
 

What's hot (20)

Aloha
AlohaAloha
Aloha
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Guided And Unguided Media
Guided And Unguided MediaGuided And Unguided Media
Guided And Unguided Media
 
Data communication basics
Data communication basicsData communication basics
Data communication basics
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Transmission media (data communication)
Transmission media (data communication)Transmission media (data communication)
Transmission media (data communication)
 
Guided and unguided media
Guided and unguided mediaGuided and unguided media
Guided and unguided media
 
Chapter 8: Switching
Chapter 8: SwitchingChapter 8: Switching
Chapter 8: Switching
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Token ring
Token ringToken ring
Token ring
 
Computer Networks basics and OSI
Computer Networks basics and OSIComputer Networks basics and OSI
Computer Networks basics and OSI
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Guided Transmission Media
Guided Transmission MediaGuided Transmission Media
Guided Transmission Media
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.ppt
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Powerpoint for data communication
Powerpoint for data communication Powerpoint for data communication
Powerpoint for data communication
 
Local area network
Local area networkLocal area network
Local area network
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeater
 
Transmission impairments(presentation)
Transmission impairments(presentation)Transmission impairments(presentation)
Transmission impairments(presentation)
 

Similar to 3. overview of data communication part 2

network topology _computer networks.pptx
network  topology _computer networks.pptxnetwork  topology _computer networks.pptx
network topology _computer networks.pptx
ManimegalaM3
 

Similar to 3. overview of data communication part 2 (20)

lecture 2,3.pdf
lecture 2,3.pdflecture 2,3.pdf
lecture 2,3.pdf
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
 
Introduction to Networks computer networking.pptx
Introduction to Networks computer networking.pptxIntroduction to Networks computer networking.pptx
Introduction to Networks computer networking.pptx
 
network topology _computer networks.pptx
network  topology _computer networks.pptxnetwork  topology _computer networks.pptx
network topology _computer networks.pptx
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
networktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdfnetworktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdf
 
networktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdfnetworktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdf
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 
Topology
TopologyTopology
Topology
 
05 network typologies
05 network typologies05 network typologies
05 network typologies
 
line coding.ppt
line coding.pptline coding.ppt
line coding.ppt
 
networktopology.pptx
networktopology.pptxnetworktopology.pptx
networktopology.pptx
 
Networks PPT
Networks PPTNetworks PPT
Networks PPT
 
Network topology
Network topologyNetwork topology
Network topology
 
Topology in Computer Network.pptx
Topology in Computer Network.pptxTopology in Computer Network.pptx
Topology in Computer Network.pptx
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Chapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBChapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMB
 
Chapter 1 ppt by dmb
Chapter 1 ppt by dmbChapter 1 ppt by dmb
Chapter 1 ppt by dmb
 
Introduction to data communications
Introduction to data communicationsIntroduction to data communications
Introduction to data communications
 

More from JAIGANESH SEKAR

More from JAIGANESH SEKAR (20)

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnetting
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnetting
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switching
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
 
2.7 wlan ieee 802.11
2.7 wlan   ieee 802.112.7 wlan   ieee 802.11
2.7 wlan ieee 802.11
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methods
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methods
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
 
2.2 flow control
2.2 flow control2.2 flow control
2.2 flow control
 
2.1 framing
2.1 framing2.1 framing
2.1 framing
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming code
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crc
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressing
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 

Recently uploaded

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 

Recently uploaded (20)

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 

3. overview of data communication part 2

  • 1. Communication Networks - Overview of Data Communication [Part 2]
  • 2. What you will learn in this video •Effectiveness of Data Communication •Components of Data Communication Data Communication •Text •Numbers •Audio •Video Data Representation •Simplex •Half Duplex •Full Duplex Flow of Data •Requirements •Physical Structure •Topology •Types of Network Network Basics
  • 3. Networks A network is the interconnection of a set of devices capable of communication Criteria for Network: A network must be able to meet a certain number of criteria. The most important of these are • Performance, • Reliability, • Security.
  • 4. Requirements of a Network • Generally we can measure the performance using 2 factors • Throughput - network throughput refers to how much data can be transferred from source to destination within a given timeframe. Throughput measures how many packets arrive at their destinations successfully • Delay – total time taken for a packet to reach the destination from source. Performance • Network reliability is measured by the frequency of failure, the time it takes a link to recover from a failure, and the network’s robustness in a catastrophe. Reliability • Network security issues include protecting data from unauthorized access, protecting data from damage and development, and implementing policies and procedures for recovery from breaches and data losses. Security
  • 5. Structure of a Network • A network is two or more devices connected through links. A link is a communications pathway that transfers data from one device to another. • There are two possible types of connections: • Point-to-Point • A point-to-point connection provides a dedicated link between two devices. The entire capacity of the link is reserved for transmission between those two devices. • Multipoint • A multipoint (also called multidrop) connection is one in which more than two specific devices share a single link. In a multipoint environment, the capacity of the channel is shared, either spatially or temporally.
  • 6. Network Topology • The term physical topology refers to the way in which a network is laid out physically. • The topology of a network is the geometric representation of the relationship of all the links and linking devices (usually called nodes) to one another. • There are four basic topologies possible: Bus Star Ring Mesh
  • 7. Bus Topology • One long cable acts as a backbone to link all the devices in a network. Nodes are connected to the bus cable by drop lines and taps. • A tap is a connector that either splices into the main cable or punctures the sheathing of a cable to create a contact with the metallic core. • A drop line is a connection running between the device and the main cable. Advantages of Bus Topology 1. Ease of installation. 2. Less cabling is required when compared to other topologies Disadvantages of Bus Topology 1. Difficult for reconnection and Fault Isolation 2. Adding of new devices is tedious 3. Degradation of signal quality due to taps 4. Cable termination is needed so as to avoid signal reflection.
  • 8. Star Topology • In a star topology, each device has a dedicated point-to-point link only to a central controller, usually called a hub. • The devices are not directly linked to one another. Star topology does not allow direct traffic between devices. • The controller acts as an exchange: If one device wants to send data to another, it sends the data to the controller, which then relays the data to the other connected device. Advantages of Star Topology: 1. Less expensive. 2. Each device needs only one link and one I/O port to connect it to a network. 3. Easy to install and reconfigure. 4. Less cabling is required 5. Robustness is high. If one link fails, only that link is affected. All other links remain active. Disadvantages of Star Topology: 1. Whole Topology depends on HUB. If the HUB goes down then the entire network is down.
  • 9. Ring Topology ❖In a ring topology, each device has a dedicated point-to-point connection with only the two devices on either side of it. ❖A signal is passed along the ring in one direction, from device to device, until it reaches its destination. ❖Each device in the ring incorporates a repeater. ❖When a device receives a signal intended for another device, its repeater regenerates the bits and passes them along. Advantages of Ring Topology: 1. Easy to install and reconfigure 2. Addition or deletion of a system in topology only requires alteration at 2 points 3. Fault Identification is easier Disadvantages of Ring Topology: 1. Supports only Unidirectional Traffic 2. Any break in the ring can disable the entire network.
  • 10. Mesh Topology • In a mesh topology, every device has a dedicated point-to-point link to every other device. • The term dedicated means that the link carries traffic only between the two devices it connects. • The number of physical links in a fully connected mesh network with n nodes, we need n (n – 1) physical links (Simplex Links). • However, if each physical link allows communication in both directions (duplex mode), we need n (n – 1) / 2 duplex-mode links. • To accommodate that many links, every device on the network must have n – 1 input/output (I/O) ports to be connected to the other n – 1 station. Advantages of Mesh Topology: 1. Dedicated Links can carry their own load, Sharing reduces the link capacity 2. Robust – Data is still delivered even if one link is down. 3. Privacy and Security – No eavesdropping 4. Fault Identification is easier Disadvantages of Mesh Topology: 1. Installation is difficult due to complex wiring 2. Requires more IO Ports to connect the systems.
  • 11. Network Topology - Summary Bus Star Ring Mesh
  • 12. Types of Networks WAN Wide Area Network Hundreds and Thousands of Kilo Meters MAN Metropolitan Area Network Tens of Kilo Meters LAN Local Area Network Hundreds of Meters PAN Personal Area Network Few Square Meters Classification Based on Size and Coverage Classification Based on Switching Switching represents that how the message is forwarded to the destination network or system Circuit Switched Network Packet Switched Network
  • 13. Circuit Switched Networks • They are widely used in the telephone networks. • It first establishes a dedicated circuit across a sequence of links • Then it allows source node to send a stream of bits across this circuit to a destination
  • 14. Packet Switched Networks • These networks are widely used in most of the applications • Messages are transmitted as packets • They follow store and forward concept of transferring packets • Packets may take any route and they are routed by the intermediate routers. • These packets are rearranged at the receiver side. • Many discrete networks are interconnected together to form a internetwork or INTERNET. • Nodes are addressed logically so that they can be identified by the neighbouring devices in the network • Packet transmission occurs in 3 modes, they are: 1. Unicast 2. Multicast 3. broadcast
  • 15. Circuit Switched Vs Packet Switched All the systems are connected as Single network Interconnections of Multiple Networks
  • 16. A heterogeneous network made of four WANs and three LANs
  • 17. References: • Behrouz A. Forouzan, ―Data communication and Networking, Fifth Edition, Tata McGraw – Hill, 2013 • Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011. • Few online References (Will be Mentioned in the description Section) Thank You…