SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Network Topology & Design
Chapter 4
Networking Essentials – Eric Vanderburg © 2005
Bus topology


Bus topology advantages






Inexpensive
Easy to design
Easy to implement

Bus topology disadvantages



Difficult to troubleshoot
Requires termination
Star topology


Star topology advantages







Break in one cable does not
affect other devices (except up links)
Easy to locate problems
Easy to install
Does not require termination like bus
topology

Star topology disadvantages




Center of star topology device (hub) can be
expensive
Hub failure can affect entire topology
Amount of cable is expensive
Ring topology


Ring topology advantages
Prevents network collisions
 Each station acts like a repeater




Ring topology disadvantages
Cable break can affect all devices
 Temporarily shut down network to add a
new station
 Maintenance and monitoring is difficult

Network Architecture


IEEE 802
CSMA/CD (802.3)
 Token Ring (802.5)


 NADN (Nearest Active Downstream

Neighbor)
 NAUN (Nearest Active Upstream Neighbor)
 Node with the token can send data
 Predictable send/receive time

Wireless Technologies (802.11)
 FDDI (Fiber Distributed Data Interface)

Media


Twisted-Pair cabling have the following
in common
Copper based data transmission
 Copper wires come in pairs
 Each Wire of a pair is twisted around each
other to protect against NEXT (Near End
Crosstalk)
 Copper wires are enclosed in a sheath
 All wire pairs are enclosed in a sheath

Media (continued)


UTP (Unshielded twisted-pair)


Advantages of UTP cable








Disadvantages of UTP cable





Thin and flexible
Easy to install
Many modern buildings come with CAT 5 installed
Small size does not fill up wiring ducts fast
Inexpensive per foot
Susceptible to interference
Cable length is 100 meters or 328 feet

RJ (Register Jacks)


RJ-45
Media (continued)
Media (continued)


STP (Shielded twisted-pair)


Advantages of STP cable






Greater protection from interference
Thin and flexible
Overall it is easy to install

Disadvantages of STP cable






Inexpensive per foot but more than UTP
STP must be grounded, problems exists if not grounded
properly
More difficult to install than UTP
Small size but does fill up wiring ducts faster than UTP
Media (continued)


Coaxial cabling (Thicknet and Thinnet)


Advantages of coaxial cabling






Cable lengths are longer than UTP/STP
Less susceptible to interference than UTP
Hubs are not required, direct connection

Disadvantages of coaxial cabling




Thicknet is very difficult to install
More expensive than UTP
Difficult to troubleshoot
Media (continued)


Thinnet and Thicknet Connectors
RG-58 cabling
 BNC
 AUI (Attachment unit interface)
 Barrel connectors
 T-connectors
 Terminators

Media (continued)


Fiber-Optic cable


Advantages of fiberoptic cabling

Transmit data over long
distances
 Not susceptible to EMI
 High transmission rates
 Not susceptible to
eavesdropping
 Small cable size
Disadvantages of fiber-optic cabling









Expensive
Cable can be easily damaged during install making installations more
difficult
Manual termination of ends is time consuming
Fiber Optic Connectors
ST (Straight Tip)

LC (Link Control)

SC (Straight
Connection)

MIC (Medium Interface Connector)

MT-RJ
two cables in one
RJ-45 clone

SMA (Subminiature Type A)
Signal Degradation (continued)


Reduce EMI/RFI


Do not place copper media next to
 Fluorescent

lights
 Generators/motors
 High-voltage electrical wire

Proper installation
 Use quality cable
 Use shielded cabling
 Use repeaters to strengthen signal on long
cable runs

Cabling
Horizontal Cabling – cables going from
the wiring closet to end nodes
 Vertical Cabling – Backbone of the
network

Wiring Closets




MDF (Main distribution
facility) – Central wiring
closet when more than
one is used
IDF (Intermediate
distribution facility) –
wiring closets off the
MDF
LAN Design Models


Two basic design strategies


Mesh
 all routers are peers,

interconnected, and
exchanging information
 Easy to set up


Hierarchical
 Easy

to troubleshoot
 Easier to manage
 Can scale better
 Can obtain better performance data
LAN Design Models


Three-layer network model
Core – WAN connectivity between sites
(usually owned by the ISP)
 Distribution – Connects buildings on the
LAN or wiring closets in a building
 Access layer – Connects nodes into the
network

Acronyms










AC, Alternating Current
AUI, Attachment Unit Interface
CMIP, Common Management Information
Protocol
EIA, Electronic Industries Alliance
TIA, Telecommunications Industry Association
FDDI, Fiber Distributed Data Interface
IDF, Intermediate Distribution Facility
MDF, Main Distribution Facility
MID, Management Information base
Acronyms










MAU, Multistation Access Unit
NEXT, Near End Crosstalk
NADN, Nearest Active Downstream Neighbor
NAUN, Nearest Active Upstream Neighbor
POP, Point of Presence
SAP, Service Access Point
STP, Shielded Twisted Pair
TDR, Time Domain Reflectometer
UTP, Unshielded Twisted Pair

Weitere ähnliche Inhalte

Was ist angesagt?

Computer Network topology
Computer Network topologyComputer Network topology
Computer Network topologyMuhammad Bilal
 
Topology presentation-sachin noire
Topology presentation-sachin noireTopology presentation-sachin noire
Topology presentation-sachin noiresachin kumar
 
Network topology....sajal
Network topology....sajalNetwork topology....sajal
Network topology....sajalSajal Das
 
Network topologies
Network topologiesNetwork topologies
Network topologiesNorah Saad
 
7 topology ethernet
7 topology ethernet7 topology ethernet
7 topology ethernetSamit Singh
 
fiber optic communication connectors
fiber optic communication connectors fiber optic communication connectors
fiber optic communication connectors Rana Kashif Hussain
 
Network topology
Network topologyNetwork topology
Network topologyilakkiya
 
TYPES OF COMPUTER NETWORK CABLES
TYPES OF COMPUTER NETWORK CABLES TYPES OF COMPUTER NETWORK CABLES
TYPES OF COMPUTER NETWORK CABLES Sayma Sultana
 
Network, Topology and iits types
Network, Topology and iits typesNetwork, Topology and iits types
Network, Topology and iits typesMuzaffar Salik
 
Network topology
Network topologyNetwork topology
Network topologyJency Pj
 
Network topologies
Network topologiesNetwork topologies
Network topologieszirram
 
BASIC NETWORKING TOPOLOGIES
BASIC NETWORKING TOPOLOGIESBASIC NETWORKING TOPOLOGIES
BASIC NETWORKING TOPOLOGIESKirti Garg
 
8 Common Network Topologies & Where to Use Them
8 Common Network Topologies & Where to Use Them8 Common Network Topologies & Where to Use Them
8 Common Network Topologies & Where to Use ThemAuvik Networks Inc.
 
Network topology
Network topologyNetwork topology
Network topologyVpmv
 

Was ist angesagt? (19)

Computer Network topology
Computer Network topologyComputer Network topology
Computer Network topology
 
Topology presentation-sachin noire
Topology presentation-sachin noireTopology presentation-sachin noire
Topology presentation-sachin noire
 
Network topology....sajal
Network topology....sajalNetwork topology....sajal
Network topology....sajal
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
7 topology ethernet
7 topology ethernet7 topology ethernet
7 topology ethernet
 
Network topology
Network topologyNetwork topology
Network topology
 
fiber optic communication connectors
fiber optic communication connectors fiber optic communication connectors
fiber optic communication connectors
 
Network topology
Network topologyNetwork topology
Network topology
 
Network topology
Network topologyNetwork topology
Network topology
 
TYPES OF COMPUTER NETWORK CABLES
TYPES OF COMPUTER NETWORK CABLES TYPES OF COMPUTER NETWORK CABLES
TYPES OF COMPUTER NETWORK CABLES
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Network, Topology and iits types
Network, Topology and iits typesNetwork, Topology and iits types
Network, Topology and iits types
 
Network topology
Network topologyNetwork topology
Network topology
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Hardware3
Hardware3Hardware3
Hardware3
 
BASIC NETWORKING TOPOLOGIES
BASIC NETWORKING TOPOLOGIESBASIC NETWORKING TOPOLOGIES
BASIC NETWORKING TOPOLOGIES
 
8 Common Network Topologies & Where to Use Them
8 Common Network Topologies & Where to Use Them8 Common Network Topologies & Where to Use Them
8 Common Network Topologies & Where to Use Them
 
Network topology
Network topologyNetwork topology
Network topology
 

Andere mochten auch

Sept 2017 network design
Sept 2017   network designSept 2017   network design
Sept 2017 network designshahin raj
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devicesKunal Bhansali
 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comPawan Sharma
 
ARCHINT: Hotel Design 1.0
ARCHINT: Hotel Design 1.0ARCHINT: Hotel Design 1.0
ARCHINT: Hotel Design 1.0ArchiEducPH
 
Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Saurav Pandey
 
Network proposal ppt
Network proposal pptNetwork proposal ppt
Network proposal pptFrankNitty II
 

Andere mochten auch (8)

Chapter1 rev1.0
Chapter1   rev1.0Chapter1   rev1.0
Chapter1 rev1.0
 
Sept 2017 network design
Sept 2017   network designSept 2017   network design
Sept 2017 network design
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devices
 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.com
 
ARCHINT: Hotel Design 1.0
ARCHINT: Hotel Design 1.0ARCHINT: Hotel Design 1.0
ARCHINT: Hotel Design 1.0
 
Cisco project ideas
Cisco   project ideasCisco   project ideas
Cisco project ideas
 
Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0
 
Network proposal ppt
Network proposal pptNetwork proposal ppt
Network proposal ppt
 

Ähnlich wie CCNA Routing and Switching Lesson 04 - Topology & Design - Eric Vanderburg

Computer Network Topology By Team_Community Connectors (Dept . of Sociology)
Computer Network Topology By Team_Community Connectors (Dept . of Sociology)Computer Network Topology By Team_Community Connectors (Dept . of Sociology)
Computer Network Topology By Team_Community Connectors (Dept . of Sociology)Suman Mia
 
Nodd's network basic
Nodd's network basicNodd's network basic
Nodd's network basicRanglaz
 
Networking
NetworkingNetworking
NetworkingRanglaz
 
Networking
NetworkingNetworking
NetworkingRanglaz
 
Networking
NetworkingNetworking
NetworkingRanglaz
 
Intro To Networking
Intro To NetworkingIntro To Networking
Intro To NetworkingPhil Ashman
 
Network Technology Presentation Bvh V01
Network Technology Presentation   Bvh V01Network Technology Presentation   Bvh V01
Network Technology Presentation Bvh V01TomMcNamara
 
BVH Network Technology Presentation
BVH   Network Technology PresentationBVH   Network Technology Presentation
BVH Network Technology PresentationTomMcNamara
 
5 intro to networking
5 intro to networking5 intro to networking
5 intro to networkingAnuja Lad
 
5 intro to networking
5 intro to networking5 intro to networking
5 intro to networkingguest0f230cfc
 
5 intro to networking
5 intro to networking5 intro to networking
5 intro to networkingKhan Rahimeen
 
Data network Fundamentals
Data network FundamentalsData network Fundamentals
Data network FundamentalsJed Concepcion
 
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdfaquazac
 
Open Elective MSE.pptx
Open Elective MSE.pptxOpen Elective MSE.pptx
Open Elective MSE.pptxathars248
 
transmission media in computer network
transmission media in computer networktransmission media in computer network
transmission media in computer networkAnsh Aggarwal
 

Ähnlich wie CCNA Routing and Switching Lesson 04 - Topology & Design - Eric Vanderburg (20)

Transmission media
Transmission mediaTransmission media
Transmission media
 
Computer Network Topology By Team_Community Connectors (Dept . of Sociology)
Computer Network Topology By Team_Community Connectors (Dept . of Sociology)Computer Network Topology By Team_Community Connectors (Dept . of Sociology)
Computer Network Topology By Team_Community Connectors (Dept . of Sociology)
 
Nodd's network basic
Nodd's network basicNodd's network basic
Nodd's network basic
 
Mod8
Mod8Mod8
Mod8
 
Networking
NetworkingNetworking
Networking
 
Networking
NetworkingNetworking
Networking
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Networking
NetworkingNetworking
Networking
 
Intro To Networking
Intro To NetworkingIntro To Networking
Intro To Networking
 
Network Technology Presentation Bvh V01
Network Technology Presentation   Bvh V01Network Technology Presentation   Bvh V01
Network Technology Presentation Bvh V01
 
BVH Network Technology Presentation
BVH   Network Technology PresentationBVH   Network Technology Presentation
BVH Network Technology Presentation
 
5 intro to networking
5 intro to networking5 intro to networking
5 intro to networking
 
5 intro to networking
5 intro to networking5 intro to networking
5 intro to networking
 
5 intro to networking
5 intro to networking5 intro to networking
5 intro to networking
 
Data network Fundamentals
Data network FundamentalsData network Fundamentals
Data network Fundamentals
 
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
 
Presentation7
Presentation7Presentation7
Presentation7
 
Network Topologies.pptx
Network Topologies.pptxNetwork Topologies.pptx
Network Topologies.pptx
 
Open Elective MSE.pptx
Open Elective MSE.pptxOpen Elective MSE.pptx
Open Elective MSE.pptx
 
transmission media in computer network
transmission media in computer networktransmission media in computer network
transmission media in computer network
 

Mehr von Eric Vanderburg

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumEric Vanderburg
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveEric Vanderburg
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgEric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Eric Vanderburg
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityEric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatEric Vanderburg
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEric Vanderburg
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology managementEric Vanderburg
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technologyEric Vanderburg
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEric Vanderburg
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challengesEric Vanderburg
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: RoboticsEric Vanderburg
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercisesEric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemEric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesEric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsEric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgEric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgEric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgEric Vanderburg
 

Mehr von Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Kürzlich hochgeladen

Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxNeo4j
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101vincent683379
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyUXDXConf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 

Kürzlich hochgeladen (20)

Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 

CCNA Routing and Switching Lesson 04 - Topology & Design - Eric Vanderburg

  • 1. Network Topology & Design Chapter 4 Networking Essentials – Eric Vanderburg © 2005
  • 2. Bus topology  Bus topology advantages     Inexpensive Easy to design Easy to implement Bus topology disadvantages   Difficult to troubleshoot Requires termination
  • 3. Star topology  Star topology advantages      Break in one cable does not affect other devices (except up links) Easy to locate problems Easy to install Does not require termination like bus topology Star topology disadvantages    Center of star topology device (hub) can be expensive Hub failure can affect entire topology Amount of cable is expensive
  • 4. Ring topology  Ring topology advantages Prevents network collisions  Each station acts like a repeater   Ring topology disadvantages Cable break can affect all devices  Temporarily shut down network to add a new station  Maintenance and monitoring is difficult 
  • 5. Network Architecture  IEEE 802 CSMA/CD (802.3)  Token Ring (802.5)   NADN (Nearest Active Downstream Neighbor)  NAUN (Nearest Active Upstream Neighbor)  Node with the token can send data  Predictable send/receive time Wireless Technologies (802.11)  FDDI (Fiber Distributed Data Interface) 
  • 6. Media  Twisted-Pair cabling have the following in common Copper based data transmission  Copper wires come in pairs  Each Wire of a pair is twisted around each other to protect against NEXT (Near End Crosstalk)  Copper wires are enclosed in a sheath  All wire pairs are enclosed in a sheath 
  • 7. Media (continued)  UTP (Unshielded twisted-pair)  Advantages of UTP cable       Disadvantages of UTP cable    Thin and flexible Easy to install Many modern buildings come with CAT 5 installed Small size does not fill up wiring ducts fast Inexpensive per foot Susceptible to interference Cable length is 100 meters or 328 feet RJ (Register Jacks)  RJ-45
  • 9. Media (continued)  STP (Shielded twisted-pair)  Advantages of STP cable     Greater protection from interference Thin and flexible Overall it is easy to install Disadvantages of STP cable     Inexpensive per foot but more than UTP STP must be grounded, problems exists if not grounded properly More difficult to install than UTP Small size but does fill up wiring ducts faster than UTP
  • 10. Media (continued)  Coaxial cabling (Thicknet and Thinnet)  Advantages of coaxial cabling     Cable lengths are longer than UTP/STP Less susceptible to interference than UTP Hubs are not required, direct connection Disadvantages of coaxial cabling    Thicknet is very difficult to install More expensive than UTP Difficult to troubleshoot
  • 11. Media (continued)  Thinnet and Thicknet Connectors RG-58 cabling  BNC  AUI (Attachment unit interface)  Barrel connectors  T-connectors  Terminators 
  • 12. Media (continued)  Fiber-Optic cable  Advantages of fiberoptic cabling Transmit data over long distances  Not susceptible to EMI  High transmission rates  Not susceptible to eavesdropping  Small cable size Disadvantages of fiber-optic cabling      Expensive Cable can be easily damaged during install making installations more difficult Manual termination of ends is time consuming
  • 13. Fiber Optic Connectors ST (Straight Tip) LC (Link Control) SC (Straight Connection) MIC (Medium Interface Connector) MT-RJ two cables in one RJ-45 clone SMA (Subminiature Type A)
  • 14. Signal Degradation (continued)  Reduce EMI/RFI  Do not place copper media next to  Fluorescent lights  Generators/motors  High-voltage electrical wire Proper installation  Use quality cable  Use shielded cabling  Use repeaters to strengthen signal on long cable runs 
  • 15. Cabling Horizontal Cabling – cables going from the wiring closet to end nodes  Vertical Cabling – Backbone of the network 
  • 16. Wiring Closets   MDF (Main distribution facility) – Central wiring closet when more than one is used IDF (Intermediate distribution facility) – wiring closets off the MDF
  • 17. LAN Design Models  Two basic design strategies  Mesh  all routers are peers, interconnected, and exchanging information  Easy to set up  Hierarchical  Easy to troubleshoot  Easier to manage  Can scale better  Can obtain better performance data
  • 18. LAN Design Models  Three-layer network model Core – WAN connectivity between sites (usually owned by the ISP)  Distribution – Connects buildings on the LAN or wiring closets in a building  Access layer – Connects nodes into the network 
  • 19. Acronyms          AC, Alternating Current AUI, Attachment Unit Interface CMIP, Common Management Information Protocol EIA, Electronic Industries Alliance TIA, Telecommunications Industry Association FDDI, Fiber Distributed Data Interface IDF, Intermediate Distribution Facility MDF, Main Distribution Facility MID, Management Information base
  • 20. Acronyms          MAU, Multistation Access Unit NEXT, Near End Crosstalk NADN, Nearest Active Downstream Neighbor NAUN, Nearest Active Upstream Neighbor POP, Point of Presence SAP, Service Access Point STP, Shielded Twisted Pair TDR, Time Domain Reflectometer UTP, Unshielded Twisted Pair