SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Roshan Basnet
Student id: 306939
1.
Network topology is a systematic arrangement of computers and its elements, including its nodes and
connecting lines.
2. The two classifications of network topology are:
a.Physical topology : The mapping of the nodes of a network and the physical connections between
them – i.e., the layout of wiring, cables, the locations of nodes, and the interconnections between the
nodes and the cabling or wiring system.
b. Logical Topology : is also called as Signal Topology.It is a network computing term used to describe
the arrangement of devices on a network and how they communicate with one another.
Logical topologies are bound to network protocols and describe how data is moved across the network
3. Four most common topologies used in industry are:
Bus topology
Ring topology.
Star topology.
Tree topology
a) Bus topology: In this topology each computer or server is connected to the single bus cable
through some kind of connector.
Advantage:
1. low wiring complexity.
2. Economical and easy to manage.
Disadvantage:
1. Limited Network.
2. A cable end which is not correctly terminated can make the entire bus inoperative, especially
with a high transmission speed.
b) Ring Topology: In this topology each computer is connected to the network in a ring and each
computer has a unique address which is used for identification purposes. The signal passes
through each computer connected to the ring in one direction.
Advantage:
Very orderly network where every device has access to the token and the opportunity to
transmit
Performs better than a star topology under heavy network load
Can create much larger network using Token Ring.
Does not require network server to manage the connectivity between the computers
Disadvantage:
One malfunctioning workstation or bad port in the MAU can create problems for the
entire network
Moves, adds and changes of devices can affect the network
Network adapter cards and MAU's are much more expensive than Ethernet cards and
hubs
Much slower than an Ethernet network under normal load
c) Star Topology: In a star topology all computers are connected to a central hub, which controls
the network communications, and can communicate with other hubs. Range limits are about
100 meters from the hub.
Advantages
Good performance
Reliable (if one connection fails, it doesn't affect others)
Easy to replace, install or remove hosts or other devices
Disadvantages
Expensive to install
Hub
Extra hardware required
d) Tree Topology: This network topology is also referred as hierarchical network. In this
topology central 'root' node (the top level) is connected to more other nodes that are on
lower level in the hierarchy with a point-to-point link between each of the second level
nodes and the top level central 'root' node, while each of the second level nodes that are
connected to the top level central 'root' node will also have one or more other nodes that
are one level lower in the hierarchy (i.e., the third level) connected to it.
Advantages :
Point-to-point wiring for individual segments.
Supported by several hardware and software companies.
Disadvantage:
More complicated network.
Expensive.
3. Hybrid Topology: It is a combination of any two or more network topologies. A hybrid topology
always accrues when two different basic network topologies are connected.
1st
level
2nd
level
hub hub
Advantage:
It allows coexistence and cohabitation by integrating different network technology to work together.
Disadvantage: It is very expensive.
Needs frequent support to maintain them.
5.Two common type of hybrid Topology are:
• A Star ring network : The Star Ring is a combination of ring and star topologies. The hubs in a star
ring are connected in a star pattern by the main hub.
This network consists of two or more star topologies connected using a multistation access unit
(MAU) as a centralized hub.
• A Star Bus network : This networking topology uses hubs for workgroups or departmental
local area networks (LANs) which is connected by using a network bus to form a single network. Star bus
topology is a combination of star topology superimposed on a backbone bus topology.
It consists of two or more star topologies connected using a bus trunk (the bus trunk serves as the
network's backbone).
6)Some organization uses hybrid topology rather than the normal topology because of the following
reasons:
a) use a combination of any two or more topologies in such a way that the resulting network
does not exhibit one of the standard topologies
b) Hybrid topology allows coexistence and cohabitation by integrating different network
technology to work together.
c) Better functionality.
7)Some topology requires end points to be terminated because Without termination, when the
signal reaches the end of the wire, it bounces back and travels back up the wire. When a signal
echoes back and forth along an unterminated bus, it is called ringing. To stop the signals from
ringing, terminators are attached at either end of the segment. The terminators absorb the
electrical energy and stop the reflections.
8) In a ring topology the funtion of Token is to transmit attached data from source to destination
computer. Token frame is repeated from station to station until arriving at a station that needs to
transmit data. When a station needs to transmit data, it converts the token frame into a data frame
for transmission. Once the sending station receives its own data frame, it converts the frame back
into a token. If a transmission error occurs and no token frame, or more than one, is present, a
special station referred to as the Active Monitor detects the problem and removes and/or reinserts
tokens as necessary
9) Being a Network Designer I would suggest to go with Star Bus Topology because of easy use
,easy to monitor the network , security and cost effectiveness..

Weitere ähnliche Inhalte

Was ist angesagt?

Network topologies
Network topologiesNetwork topologies
Network topologieszirram
 
Types of Network Topologies
Types of Network TopologiesTypes of Network Topologies
Types of Network TopologiesYusuf Khan
 
Topology
TopologyTopology
TopologyMaths
 
Network topology by Dr. Gholkar D. R.
Network topology by Dr. Gholkar D. R.Network topology by Dr. Gholkar D. R.
Network topology by Dr. Gholkar D. R.drgholkar
 
Network Topology and its types
Network Topology and its typesNetwork Topology and its types
Network Topology and its typesMadhuri Badgujar
 
Network topologies
Network topologiesNetwork topologies
Network topologiesTom Hanstead
 
Physical and logical topologies in computer network and client server
Physical  and logical topologies in computer network and client serverPhysical  and logical topologies in computer network and client server
Physical and logical topologies in computer network and client serverSatya P. Joshi
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devicesKunal Bhansali
 
Network Topology and it's types Star topology, Ring topology, Bus topology an...
Network Topology and it's types Star topology, Ring topology, Bus topology an...Network Topology and it's types Star topology, Ring topology, Bus topology an...
Network Topology and it's types Star topology, Ring topology, Bus topology an...Self-employed
 

Was ist angesagt? (20)

Network topology And Its type
Network topology And Its typeNetwork topology And Its type
Network topology And Its type
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Topologies
TopologiesTopologies
Topologies
 
Types of Network Topologies
Types of Network TopologiesTypes of Network Topologies
Types of Network Topologies
 
Topology
TopologyTopology
Topology
 
Computer Network Topologies
Computer  Network TopologiesComputer  Network Topologies
Computer Network Topologies
 
Network topology by Dr. Gholkar D. R.
Network topology by Dr. Gholkar D. R.Network topology by Dr. Gholkar D. R.
Network topology by Dr. Gholkar D. R.
 
Network Topology and its types
Network Topology and its typesNetwork Topology and its types
Network Topology and its types
 
Network topology
Network topology Network topology
Network topology
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
network topology
network topologynetwork topology
network topology
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Network topology And Its Types
Network topology And Its Types Network topology And Its Types
Network topology And Its Types
 
Bus topology ppt
Bus topology pptBus topology ppt
Bus topology ppt
 
Physical and logical topologies in computer network and client server
Physical  and logical topologies in computer network and client serverPhysical  and logical topologies in computer network and client server
Physical and logical topologies in computer network and client server
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devices
 
NETWORK TOPOLOGIES (NETWORK TOPOLOGY)
NETWORK TOPOLOGIES (NETWORK TOPOLOGY)NETWORK TOPOLOGIES (NETWORK TOPOLOGY)
NETWORK TOPOLOGIES (NETWORK TOPOLOGY)
 
Networking notes2
Networking notes2Networking notes2
Networking notes2
 
Network Topology and it's types Star topology, Ring topology, Bus topology an...
Network Topology and it's types Star topology, Ring topology, Bus topology an...Network Topology and it's types Star topology, Ring topology, Bus topology an...
Network Topology and it's types Star topology, Ring topology, Bus topology an...
 

Andere mochten auch

Network Strategy and Design Final assignment disaster rec
Network Strategy and Design Final assignment disaster recNetwork Strategy and Design Final assignment disaster rec
Network Strategy and Design Final assignment disaster recrosu555
 
Hedging Opportunities_Croatian Association of Corporate Treasurers (1)
Hedging Opportunities_Croatian Association of Corporate Treasurers (1)Hedging Opportunities_Croatian Association of Corporate Treasurers (1)
Hedging Opportunities_Croatian Association of Corporate Treasurers (1)Irene Zaslavsky
 
Disaster Recovery in the Cloud - a provider's view
Disaster Recovery in the Cloud - a provider's viewDisaster Recovery in the Cloud - a provider's view
Disaster Recovery in the Cloud - a provider's viewKarolina Dryja
 
Disaster recovery in the Cloud - whitepaper
Disaster recovery in the Cloud - whitepaper Disaster recovery in the Cloud - whitepaper
Disaster recovery in the Cloud - whitepaper Karolina Dryja
 
Tópicos literarios
Tópicos literariosTópicos literarios
Tópicos literarioscolegio
 
Limtech - Presentation Product
Limtech - Presentation ProductLimtech - Presentation Product
Limtech - Presentation ProductAndréa Berry
 
Evaluacion dca
Evaluacion dcaEvaluacion dca
Evaluacion dcaharrypoker
 
Presentation powerpoint Test Animation
Presentation powerpoint Test AnimationPresentation powerpoint Test Animation
Presentation powerpoint Test AnimationAgence NextSlide
 
El Trobador de la Mare de Déu Volum III Pròleg
El Trobador de la Mare de Déu Volum III PròlegEl Trobador de la Mare de Déu Volum III Pròleg
El Trobador de la Mare de Déu Volum III PròlegMireia Olivé Cristany
 
BASE DE DATOS
BASE DE DATOSBASE DE DATOS
BASE DE DATOSbacr
 
Republika 11 Maret 2014
Republika 11 Maret 2014Republika 11 Maret 2014
Republika 11 Maret 2014hastapurnama
 

Andere mochten auch (20)

Network Strategy and Design Final assignment disaster rec
Network Strategy and Design Final assignment disaster recNetwork Strategy and Design Final assignment disaster rec
Network Strategy and Design Final assignment disaster rec
 
Myface
MyfaceMyface
Myface
 
2solicitor
2solicitor2solicitor
2solicitor
 
Allision
AllisionAllision
Allision
 
Hedging Opportunities_Croatian Association of Corporate Treasurers (1)
Hedging Opportunities_Croatian Association of Corporate Treasurers (1)Hedging Opportunities_Croatian Association of Corporate Treasurers (1)
Hedging Opportunities_Croatian Association of Corporate Treasurers (1)
 
Disaster Recovery in the Cloud - a provider's view
Disaster Recovery in the Cloud - a provider's viewDisaster Recovery in the Cloud - a provider's view
Disaster Recovery in the Cloud - a provider's view
 
Disaster recovery in the Cloud - whitepaper
Disaster recovery in the Cloud - whitepaper Disaster recovery in the Cloud - whitepaper
Disaster recovery in the Cloud - whitepaper
 
Rivercity Report design
Rivercity Report design Rivercity Report design
Rivercity Report design
 
Word2010
Word2010Word2010
Word2010
 
Integritas
IntegritasIntegritas
Integritas
 
Sekilas tentang sun com
Sekilas tentang sun comSekilas tentang sun com
Sekilas tentang sun com
 
Juegos olímpicos informatica
Juegos olímpicos informaticaJuegos olímpicos informatica
Juegos olímpicos informatica
 
Tópicos literarios
Tópicos literariosTópicos literarios
Tópicos literarios
 
Pezzol UAE Catalog[1]
Pezzol UAE Catalog[1]Pezzol UAE Catalog[1]
Pezzol UAE Catalog[1]
 
Limtech - Presentation Product
Limtech - Presentation ProductLimtech - Presentation Product
Limtech - Presentation Product
 
Evaluacion dca
Evaluacion dcaEvaluacion dca
Evaluacion dca
 
Presentation powerpoint Test Animation
Presentation powerpoint Test AnimationPresentation powerpoint Test Animation
Presentation powerpoint Test Animation
 
El Trobador de la Mare de Déu Volum III Pròleg
El Trobador de la Mare de Déu Volum III PròlegEl Trobador de la Mare de Déu Volum III Pròleg
El Trobador de la Mare de Déu Volum III Pròleg
 
BASE DE DATOS
BASE DE DATOSBASE DE DATOS
BASE DE DATOS
 
Republika 11 Maret 2014
Republika 11 Maret 2014Republika 11 Maret 2014
Republika 11 Maret 2014
 

Ähnlich wie Topography

Network using topologies
Network using topologiesNetwork using topologies
Network using topologiesJaveria600
 
Network topology
Network topologyNetwork topology
Network topologylekshmik
 
4-Topology and Categories of Network-06-01-2024.PPT
4-Topology and Categories of Network-06-01-2024.PPT4-Topology and Categories of Network-06-01-2024.PPT
4-Topology and Categories of Network-06-01-2024.PPTvedhatrioathi100
 
Network Topologies.pptx
Network Topologies.pptxNetwork Topologies.pptx
Network Topologies.pptxkulmiye2
 
Network topology
Network topologyNetwork topology
Network topologyyadi1984
 
Networktopology xii
Networktopology xiiNetworktopology xii
Networktopology xiisaltyp
 
Types of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterTypes of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterAlidHasan4
 
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxSuratSingh18
 
Best Topology
Best TopologyBest Topology
Best Topologyami872
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks Kathirvel Ayyaswamy
 
Network Topologies in computer networking
Network Topologies in computer networkingNetwork Topologies in computer networking
Network Topologies in computer networkingnazmulabdal
 
Network topology
Network topologyNetwork topology
Network topologyArjonDando1
 

Ähnlich wie Topography (20)

report.pptx
report.pptxreport.pptx
report.pptx
 
Network using topologies
Network using topologiesNetwork using topologies
Network using topologies
 
original
originaloriginal
original
 
Topology
TopologyTopology
Topology
 
Network topology
Network topologyNetwork topology
Network topology
 
4-Topology and Categories of Network-06-01-2024.PPT
4-Topology and Categories of Network-06-01-2024.PPT4-Topology and Categories of Network-06-01-2024.PPT
4-Topology and Categories of Network-06-01-2024.PPT
 
Network Topologies.pptx
Network Topologies.pptxNetwork Topologies.pptx
Network Topologies.pptx
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Network topology
Network topologyNetwork topology
Network topology
 
Networktopology xii
Networktopology xiiNetworktopology xii
Networktopology xii
 
Network topology
Network topologyNetwork topology
Network topology
 
Types of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouterTypes of network topology, hub, switch, router, repeater and brouter
Types of network topology, hub, switch, router, repeater and brouter
 
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
 
Best Topology
Best TopologyBest Topology
Best Topology
 
Class work3
Class work3Class work3
Class work3
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
Network Topologies in computer networking
Network Topologies in computer networkingNetwork Topologies in computer networking
Network Topologies in computer networking
 
Network Topologies in Simple (Logical, Physical and Types)
Network Topologies in Simple (Logical, Physical and Types)Network Topologies in Simple (Logical, Physical and Types)
Network Topologies in Simple (Logical, Physical and Types)
 
Networking report
Networking reportNetworking report
Networking report
 
Network topology
Network topologyNetwork topology
Network topology
 

Kürzlich hochgeladen

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Kürzlich hochgeladen (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Topography

  • 1. Roshan Basnet Student id: 306939 1. Network topology is a systematic arrangement of computers and its elements, including its nodes and connecting lines. 2. The two classifications of network topology are: a.Physical topology : The mapping of the nodes of a network and the physical connections between them – i.e., the layout of wiring, cables, the locations of nodes, and the interconnections between the nodes and the cabling or wiring system. b. Logical Topology : is also called as Signal Topology.It is a network computing term used to describe the arrangement of devices on a network and how they communicate with one another. Logical topologies are bound to network protocols and describe how data is moved across the network 3. Four most common topologies used in industry are: Bus topology Ring topology. Star topology. Tree topology a) Bus topology: In this topology each computer or server is connected to the single bus cable through some kind of connector. Advantage: 1. low wiring complexity. 2. Economical and easy to manage. Disadvantage: 1. Limited Network. 2. A cable end which is not correctly terminated can make the entire bus inoperative, especially with a high transmission speed.
  • 2. b) Ring Topology: In this topology each computer is connected to the network in a ring and each computer has a unique address which is used for identification purposes. The signal passes through each computer connected to the ring in one direction. Advantage: Very orderly network where every device has access to the token and the opportunity to transmit Performs better than a star topology under heavy network load Can create much larger network using Token Ring. Does not require network server to manage the connectivity between the computers Disadvantage: One malfunctioning workstation or bad port in the MAU can create problems for the entire network Moves, adds and changes of devices can affect the network Network adapter cards and MAU's are much more expensive than Ethernet cards and hubs Much slower than an Ethernet network under normal load c) Star Topology: In a star topology all computers are connected to a central hub, which controls the network communications, and can communicate with other hubs. Range limits are about 100 meters from the hub. Advantages Good performance Reliable (if one connection fails, it doesn't affect others) Easy to replace, install or remove hosts or other devices Disadvantages Expensive to install Hub
  • 3. Extra hardware required d) Tree Topology: This network topology is also referred as hierarchical network. In this topology central 'root' node (the top level) is connected to more other nodes that are on lower level in the hierarchy with a point-to-point link between each of the second level nodes and the top level central 'root' node, while each of the second level nodes that are connected to the top level central 'root' node will also have one or more other nodes that are one level lower in the hierarchy (i.e., the third level) connected to it. Advantages : Point-to-point wiring for individual segments. Supported by several hardware and software companies. Disadvantage: More complicated network. Expensive. 3. Hybrid Topology: It is a combination of any two or more network topologies. A hybrid topology always accrues when two different basic network topologies are connected. 1st level 2nd level hub hub
  • 4. Advantage: It allows coexistence and cohabitation by integrating different network technology to work together. Disadvantage: It is very expensive. Needs frequent support to maintain them. 5.Two common type of hybrid Topology are: • A Star ring network : The Star Ring is a combination of ring and star topologies. The hubs in a star ring are connected in a star pattern by the main hub. This network consists of two or more star topologies connected using a multistation access unit (MAU) as a centralized hub. • A Star Bus network : This networking topology uses hubs for workgroups or departmental local area networks (LANs) which is connected by using a network bus to form a single network. Star bus topology is a combination of star topology superimposed on a backbone bus topology. It consists of two or more star topologies connected using a bus trunk (the bus trunk serves as the network's backbone). 6)Some organization uses hybrid topology rather than the normal topology because of the following reasons:
  • 5. a) use a combination of any two or more topologies in such a way that the resulting network does not exhibit one of the standard topologies b) Hybrid topology allows coexistence and cohabitation by integrating different network technology to work together. c) Better functionality. 7)Some topology requires end points to be terminated because Without termination, when the signal reaches the end of the wire, it bounces back and travels back up the wire. When a signal echoes back and forth along an unterminated bus, it is called ringing. To stop the signals from ringing, terminators are attached at either end of the segment. The terminators absorb the electrical energy and stop the reflections. 8) In a ring topology the funtion of Token is to transmit attached data from source to destination computer. Token frame is repeated from station to station until arriving at a station that needs to transmit data. When a station needs to transmit data, it converts the token frame into a data frame for transmission. Once the sending station receives its own data frame, it converts the frame back into a token. If a transmission error occurs and no token frame, or more than one, is present, a special station referred to as the Active Monitor detects the problem and removes and/or reinserts tokens as necessary 9) Being a Network Designer I would suggest to go with Star Bus Topology because of easy use ,easy to monitor the network , security and cost effectiveness..