SlideShare uma empresa Scribd logo
1 de 37
DATADATA
COMMUNICATIONCOMMUNICATION
LeCTUre-3LeCTUre-3
reCAp Of LeCTUre 2reCAp Of LeCTUre 2
• Key DataCommunication Terminology
• DataFlow/ Transmission Modes
• Networksand Why weneed Them?
• Distributed Processing
• Network Criteria
• Physical structureof Network
• Typeof connection
OvervIew Of LeCTUre 3OvervIew Of LeCTUre 3
• Physical Structureof Network
• Physical Topologies
1. Bus
2. Mesh
3. Star
4. Ring
5. Tree
6. Hybrid
TOpOLOgy
“The Topology is the geometric
representation of the relationship of
the links and linking devices”
OR
“Topology defines physical or logical
arrangement of links in a Network”
TOpOLOgy (CONT.)
• The ways in which the wires can be run in the network
to link with thecomputer.
• The ways in which the connections are made in the
network.
• Simply Thephysical layout of thenetwork.
CATegOrIes Of TOpOLOgy
Topology
Mesh Star Tree Bus Ring
BUs TOpOLOgy
BUs TOpOLOgy (CONT.)
• Structure
• A bustopology, ismultipoint.
• Onelong cableactsasabackboneto link all thedevicesin anetwork.
• Nodesareconnected to thebuscableby drop linesand taps.
• A drop line is a connection running between the device and the main
cable.
• A tap is a connector that either splices into the main cable or punctures
thesheathing of acableto createacontact with themetallic core.
• As a signal travels along the backbone, some of its energy is transformed
into heat. Therefore, it becomes weaker and weaker as it travels farther
and farther. For this reason there is a limit on the number of taps a bus
can support and on thedistancebetween thosetaps.
BUs TOpOLOgy (CONT.)
• In abusnetwork every workstation needs
• BNC Barrel Connectors
• T-Connectors
• Terminators
• NIC.
• T-Connectors are used to provide connection from the bus link to a
workstation.
• NIC (Network Interface Card) is used to link a workstation with the
network.
• Barrel Connectors are used to connect two parts of a cable either broken
or when additional wireisrequired.
• Terminators areused for Termination purpose.
• Basically Thin Coaxial Cableisused in thistopology.
BUs TOpOLOgy (CONT.)
• Uses:
• It is often used when network installation is small, simply
or temporary.
• Busisapassivetopology,
• i.e. no activeelectron isused to amplify thesignal.
Bus Topology (ConT.)
• WORKING:
• Broadcast network
• all the computers on the network receive the information, but
only one computer (the one with the address that matches the
oneencoded in themessage) acceptstheinformation. Therest
disregardsthemessage.
• Protocol used is CSMA/CD (Carrier Sense Multiple Access
with Collision Detection),
• i.e. only one device can transmit the data at a time. More than
one signal introduces collision. It means if one computer
sends a signal over the bus; the other computer must wait for
sometime.
Bus Topology (ConT.)
Another important issuein busnetwork istermination.
Without termination, when thesignal reachestheend of the
wire, it bounces back and travels back up the wire which
makesthenetwork busy.
To stop the bouncing signal, we attach terminators at either
end of segment.
The terminator absorbs the electrical energy and stops the
reflection.
Example
○ Ethernet10Base2, 10Base5, and ARC Net.
Bus Topology (ConT.)
• ADVANTAGES
• popular because its working requirements are
comparatively simple, and growth is accomplished easily
and quickly.
• Easy to useand understand.
• It isreliablein small networks.
• Repeater can beused to extend thenetwork.
• It requiresleast amount of cable.
• It islessexpensivein cost.
Bus Topology (ConT.)
• DISADVANTAGES
• Heavy network traffic can slow the Bus, considerably
(morecollision, morewaiting time).
• Each BNC Barrel connecter weakens the signals as it
absorbsenergy for itsown charge.
• Difficult to troubleshoot and maintain because of cable
break, looseconnector, and malfunctioning computer.
• Singlecomputer failuredisturbsthewholenetwork.
• Not a good choice for large organizations, because of
slow datatraffic.
Mesh Topology
Mesh Topology (ConT.)
• In a mesh topology, every device has a dedicated point-to-point
link to every other device.
• The term dedicated means that the link carries traffic only
between thetwo devicesit connects.
• Primarily used in networksthat aremostly not LANs.
• Madeup of multiplepoint to point connections.
• Mesh networks can get complicated very quickly, because many
connectionsmust bemanaged in anetwork of any size.
• Mesh topology haveredundant linksbetween devices.
• Each workstation is connected with a multi-port device like HUB
that broadcaststhedata.
• Therearetwo typesof Mesh, i.e.
• TrueMesh
• HybridMesh
Mesh Topology (ConT.)
• TRUEMESH
• A true Mesh has a link between each device in the
network.
• It meansthat network isfully connected.
• A true mesh of six devices requires fifteen connections (5
x 6)/2 = 15 links and that for seven devices requires 21
links.
• The formula for finding total links in a true mesh is [n *
(n– 1)] /2, wherenistotal number of workstations.
Mesh Topology (ConT.)
• HYBRIDMESH
• Hybrid Mesh has extra links but not fully connected.
Most Mesh topology networks are Hybrid Mesh
networks.
links and porTs in Mesh
Topology
• Number of Linksrequired to connect ‘n’ devices: n(n-1)/2
• Number of I/O Ports: n-1
• In figureabove, wehave5 Nodes, therefore:
• No. of Links= 5(5-1)/2 = 10
• No. of I/O Ports= 5-1 = 4
Mesh Topology (ConT.)
• ADVANTAGES
• Each dedicated connection can carry its own data load,
thuseliminating thetraffic problems.
• It is robust. If one link becomes unusable, it does not
incapacitatetheentiresystem.
• privacy or security. Physical boundaries prevent other
usersfrom gaining accessto messages.
• Point-to-point links make fault identification and fault
isolation easy.
Mesh Topology (ConT.)
• DISADVANTAGES:
• Amount of cabling and thenumber of I/O portsrequired
• Installation and reconnection aredifficult.
• The sheer bulk of the wiring can be greater than the
available space (in walls, ceilings, or floors) can
accommodate.
• The hardware required to connect each link (I/O ports and
cable) can beprohibitively expensive.
sTar Topology
sTar Topology (ConT.)
• Most commonly used network topology
• STRUCTURE:
• Each device has a dedicated point-to-point link only to a
central controller, usually called ahub or switch.
• Thedevicesarenot directly linked to oneanother.
• Unlike a mesh topology, a star topology does not allow
direct traffic between devices.
• The controller acts as an exchange: If one device wants to
send data to another, it sends the data to the controller,
which then relaysthedatato theother connected device.
sTar Topology (ConT.)
• WORKING:
• Each computer on star network communicates with a
Hub, that resend the message either to all computers
which is called Broadcasting Star or only to the
destination nodewhich iscalled Switched Star.
• Now-a-daysmost of Switched Star networksuseSwitches
instead of Intelligent Hubs because switches are less
expensivethan Intelligent hubs.
sTar Topology (ConT.)
• ADVANTAGES:
• Easy modification and expansion, without disturbing rest of the
network.
• Singlecomputer failuredoesnot affect thewholenetwork.
• Support of several cablestypesin thesamenetwork.
• Most flexibleof thethreetopologiesand easiest to diagnose.
• It islessexpensivethan amesh topology.
• Each device needs only one link and one I/O port to connect it
to any number of others.
• Thisfactor also makesit easy to install and reconfigure.
• Far lesscabling needed ascompareto mesh topology.
• Robustness. If one link fails, only that link is affected. All other
links remain active. This factor also lends itself to easy fault
identification and fault isolation.
sTar Topology (ConT.)
• DISADVANTAGES:
• Dependency of the whole topology on one single point,
thehub. If thehub goesdown, thewholesystem isdead.
• More cables are required as compare to Bus and Ring
topology and also Hub isexpensive.
rIng Topology
rIng TopologyrIng Topology
• Each device has a dedicated point-to-point connection with
only thetwo deviceson either sideof it.
• A signal is passed along the ring in one direction, from device
to device, until it reachesitsdestination.
• Each device in the ring incorporates a repeater. When a device
receives a signal intended for another device, its repeater
regeneratesthebitsand passesthem along
• Cable may be Coaxial with connectors or may be twisted pair
with aHUB. Commonly Twisted Pair cableisused.
• Thereisno termination becausethereisno end to thering.
1.29
rIng TopologyrIng Topology
rIng Topology
• Working:
• For data transmission, medium access is required that is done by Token
and thetechniqueisknown asToken Passing.
• Token is a short message that is passed around the ring until a computer
wishes to sends information to another computer, That computer modifies
thetoken, addsan electronic address& data, and sendsit around thering.
• Each computer in sequence receives the token and the information and
passes them to the next computer until either the electronic address
matches the address of a computer or the token returns to its origin. The
receiving computer returns a message to the originator indicating that the
messagehasbeen received.
• The sending computer then creates the token and begins transmitting. The
token circulatesuntil astation isready to send and capturesthetoken.
RING TOPOLOGY
• This all happens very quickly, a token can circle a ring 200
meters in diameter at about 10,000 times a second. Some
faster networkscirculateseveral tokensat once.
• Transmitted data moves in clockwise direction therefore there
isno chanceof collision.
• Example: FDDI is a fast fiber-optic network based on the
ring topology. Token ring isanother ring based network.
RING TOPOLOGYRING TOPOLOGY
• ADVANTAGES:
• It eliminates LANs depending on a central computer by
distributing someof thecentral systemsresponsibility to all
theother connected workstation.
• Every workstation on the ring listens to see if the network
is clear before sending a message. This helps avoiding
collision between themessages.
• The network degrades gracefully as more users we added
i.e. thenetwork doesn’t failed.
RING TOPOLOGYRING TOPOLOGY
• DISADVANTAGES:
• Failure of one computer on the ring can affect the whole
network.
• Also difficult to troubleshoot.
• Adding or removing nodesdisturb thenetwork.
TRee TOPOLOGYTRee TOPOLOGY
hYbRId TOPOLOGY:hYbRId TOPOLOGY:
a sTaR backbONe wITh ThRee bus NeTwORksa sTaR backbONe wITh ThRee bus NeTwORks
summaRYsummaRY
• Physical Structureof Network
• Physical Topologies
1. Bus
2. Mesh
3. Star
4. Ring
5. Tree
6. Hybrid
suGGesTed ReadINGsuGGesTed ReadING
• Section
– 1.2
• “Data Communications and Networking” 4th
Edition by
Behrouz A. Forouzan

Mais conteúdo relacionado

Mais procurados

Network topologies & network devices
Network topologies & network devicesNetwork topologies & network devices
Network topologies & network devicesAnnajab
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer NetworkingHj Habib
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005SOLOMONCHINAEMEUCHEA
 
Computer Networks basics and OSI
Computer Networks basics and OSIComputer Networks basics and OSI
Computer Networks basics and OSICS_GDRCST
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application pptNitesh Dubey
 
20372748 case-study-on-computer-networking-kotak-mahindra-bank
20372748 case-study-on-computer-networking-kotak-mahindra-bank20372748 case-study-on-computer-networking-kotak-mahindra-bank
20372748 case-study-on-computer-networking-kotak-mahindra-bankShivani Joshi
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkRutwik Jadhav
 
Introduction of network
Introduction of networkIntroduction of network
Introduction of networksharone singh
 
Network topoligies
Network topoligiesNetwork topoligies
Network topoligiesAli Kamran
 
Networking ppt by swapi
Networking ppt by swapi Networking ppt by swapi
Networking ppt by swapi Swapi Pawar
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologiesAyush0734
 
DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)Rasan Samarasinghe
 

Mais procurados (20)

Network topologies & network devices
Network topologies & network devicesNetwork topologies & network devices
Network topologies & network devices
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
 
Computer Networks basics and OSI
Computer Networks basics and OSIComputer Networks basics and OSI
Computer Networks basics and OSI
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application ppt
 
Topology
TopologyTopology
Topology
 
20372748 case-study-on-computer-networking-kotak-mahindra-bank
20372748 case-study-on-computer-networking-kotak-mahindra-bank20372748 case-study-on-computer-networking-kotak-mahindra-bank
20372748 case-study-on-computer-networking-kotak-mahindra-bank
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Introduction of network
Introduction of networkIntroduction of network
Introduction of network
 
Network topoligies
Network topoligiesNetwork topoligies
Network topoligies
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Networking ppt by swapi
Networking ppt by swapi Networking ppt by swapi
Networking ppt by swapi
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologies
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Computer network
Computer  networkComputer  network
Computer network
 
Networks PPT
Networks PPTNetworks PPT
Networks PPT
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)
 

Destaque

Dc lec-05 (protocols & standards)
Dc lec-05 (protocols & standards)Dc lec-05 (protocols & standards)
Dc lec-05 (protocols & standards)diaryinc
 
Whats New In Visual Studio 2010
Whats New In Visual Studio 2010Whats New In Visual Studio 2010
Whats New In Visual Studio 2010Daniel Egan
 
Dc lec-06 & 07 (osi model)
Dc lec-06 & 07 (osi model)Dc lec-06 & 07 (osi model)
Dc lec-06 & 07 (osi model)diaryinc
 
Parts of Speech
Parts of SpeechParts of Speech
Parts of Speechdiaryinc
 
Building DotNetNuke Modules
Building DotNetNuke ModulesBuilding DotNetNuke Modules
Building DotNetNuke ModulesEngage Software
 
Dc lec- (network models)
Dc lec- (network models)Dc lec- (network models)
Dc lec- (network models)diaryinc
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technologyWish Mrt'xa
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Usersalmario1988
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpointstanbridge
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Presentation on Bangladesh
Presentation on BangladeshPresentation on Bangladesh
Presentation on BangladeshTawhid Rahman
 
Networking lecture 4 Data Link Layer by Mamun sir
Networking lecture 4 Data Link Layer by Mamun sirNetworking lecture 4 Data Link Layer by Mamun sir
Networking lecture 4 Data Link Layer by Mamun sirsharifbdp
 
IP addressing by Mamun Sir
IP addressing by Mamun SirIP addressing by Mamun Sir
IP addressing by Mamun Sirsharifbdp
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksShafaan Khaliq Bhatti
 

Destaque (20)

Dc lec-05 (protocols & standards)
Dc lec-05 (protocols & standards)Dc lec-05 (protocols & standards)
Dc lec-05 (protocols & standards)
 
Whats New In Visual Studio 2010
Whats New In Visual Studio 2010Whats New In Visual Studio 2010
Whats New In Visual Studio 2010
 
Osi layer notes
Osi layer notesOsi layer notes
Osi layer notes
 
Dc lec-06 & 07 (osi model)
Dc lec-06 & 07 (osi model)Dc lec-06 & 07 (osi model)
Dc lec-06 & 07 (osi model)
 
Parts of Speech
Parts of SpeechParts of Speech
Parts of Speech
 
Introduction to Visual Studio.NET
Introduction to Visual Studio.NETIntroduction to Visual Studio.NET
Introduction to Visual Studio.NET
 
Building DotNetNuke Modules
Building DotNetNuke ModulesBuilding DotNetNuke Modules
Building DotNetNuke Modules
 
Dc lec- (network models)
Dc lec- (network models)Dc lec- (network models)
Dc lec- (network models)
 
VB.Net GUI Unit_01
VB.Net GUI Unit_01VB.Net GUI Unit_01
VB.Net GUI Unit_01
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technology
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Users
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Dotnet basics
Dotnet basicsDotnet basics
Dotnet basics
 
Presentation on Bangladesh
Presentation on BangladeshPresentation on Bangladesh
Presentation on Bangladesh
 
Networking lecture 4 Data Link Layer by Mamun sir
Networking lecture 4 Data Link Layer by Mamun sirNetworking lecture 4 Data Link Layer by Mamun sir
Networking lecture 4 Data Link Layer by Mamun sir
 
IP addressing by Mamun Sir
IP addressing by Mamun SirIP addressing by Mamun Sir
IP addressing by Mamun Sir
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 

Semelhante a Data Communication Topologies

Network topologies
Network topologiesNetwork topologies
Network topologiesNorah Saad
 
Mithun Network topology .pptx
Mithun Network topology .pptxMithun Network topology .pptx
Mithun Network topology .pptxMithun838675
 
1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdfsophia763824
 
1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdfJamesOtieno34
 
Web applications and security. By: Partha Jee Chauhan, MSc Computer Science
Web applications and security. By: Partha Jee Chauhan, MSc Computer ScienceWeb applications and security. By: Partha Jee Chauhan, MSc Computer Science
Web applications and security. By: Partha Jee Chauhan, MSc Computer SciencePartha Jee Chauhan
 
Computer network
Computer networkComputer network
Computer networkSimran Kaur
 
Topology,Switching and Routing
Topology,Switching and RoutingTopology,Switching and Routing
Topology,Switching and RoutingAnushiya Ram
 
1-introduction-to-computer-networking-converted 2.pptx
1-introduction-to-computer-networking-converted 2.pptx1-introduction-to-computer-networking-converted 2.pptx
1-introduction-to-computer-networking-converted 2.pptxYashwant Srikrishnan
 
Network Topology
Network TopologyNetwork Topology
Network TopologyAmshalEjaz1
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxAASTHAJAJOO
 
Chapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBChapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBdhanashrisabale1
 
Lecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.pptLecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.pptflyinimohamed
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methodsRaja Waseem Akhtar
 

Semelhante a Data Communication Topologies (20)

Network topologies
Network topologiesNetwork topologies
Network topologies
 
Mithun Network topology .pptx
Mithun Network topology .pptxMithun Network topology .pptx
Mithun Network topology .pptx
 
Networks topologies Lec#2
Networks topologies Lec#2Networks topologies Lec#2
Networks topologies Lec#2
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf
 
1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf1-introduction-to-computer-networking.pdf
1-introduction-to-computer-networking.pdf
 
Web applications and security. By: Partha Jee Chauhan, MSc Computer Science
Web applications and security. By: Partha Jee Chauhan, MSc Computer ScienceWeb applications and security. By: Partha Jee Chauhan, MSc Computer Science
Web applications and security. By: Partha Jee Chauhan, MSc Computer Science
 
Computer network
Computer networkComputer network
Computer network
 
Topology,Switching and Routing
Topology,Switching and RoutingTopology,Switching and Routing
Topology,Switching and Routing
 
1-introduction-to-computer-networking-converted 2.pptx
1-introduction-to-computer-networking-converted 2.pptx1-introduction-to-computer-networking-converted 2.pptx
1-introduction-to-computer-networking-converted 2.pptx
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptx
 
Network Topology
Network Topology Network Topology
Network Topology
 
Chapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBChapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMB
 
Chapter 1 ppt by dmb
Chapter 1 ppt by dmbChapter 1 ppt by dmb
Chapter 1 ppt by dmb
 
Lecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.pptLecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.ppt
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methods
 
Unit2.2
Unit2.2Unit2.2
Unit2.2
 
Network Topologies in Simple (Logical, Physical and Types)
Network Topologies in Simple (Logical, Physical and Types)Network Topologies in Simple (Logical, Physical and Types)
Network Topologies in Simple (Logical, Physical and Types)
 

Mais de diaryinc

Nationalization Act In Pakistan
Nationalization Act In PakistanNationalization Act In Pakistan
Nationalization Act In Pakistandiaryinc
 
SUMMARY OF “EVOLUTION OF MANAGEMENT THINKING”
SUMMARY OF “EVOLUTION OF MANAGEMENT THINKING”SUMMARY OF “EVOLUTION OF MANAGEMENT THINKING”
SUMMARY OF “EVOLUTION OF MANAGEMENT THINKING”diaryinc
 
PURPOSE OF GOALS & PLANS
PURPOSE OF GOALS & PLANSPURPOSE OF GOALS & PLANS
PURPOSE OF GOALS & PLANSdiaryinc
 
STRATEGY FORMULATION AND IMPLEMENTATION
STRATEGY FORMULATION AND IMPLEMENTATIONSTRATEGY FORMULATION AND IMPLEMENTATION
STRATEGY FORMULATION AND IMPLEMENTATIONdiaryinc
 
Pakistan state Oil (PSO)
Pakistan state Oil (PSO)Pakistan state Oil (PSO)
Pakistan state Oil (PSO)diaryinc
 
Business plan of YOGA INSTITUTE
Business plan of YOGA INSTITUTE Business plan of YOGA INSTITUTE
Business plan of YOGA INSTITUTE diaryinc
 
Business plan for " A CHILDCARE CENTER IN PESHAWAR"
Business plan for " A CHILDCARE CENTER IN PESHAWAR"Business plan for " A CHILDCARE CENTER IN PESHAWAR"
Business plan for " A CHILDCARE CENTER IN PESHAWAR"diaryinc
 
Financial accounting solution manual
Financial accounting solution manualFinancial accounting solution manual
Financial accounting solution manualdiaryinc
 
Nts book-for-gat-general
Nts book-for-gat-generalNts book-for-gat-general
Nts book-for-gat-generaldiaryinc
 
Edwardes College Prospectus 2014-15
Edwardes College Prospectus 2014-15Edwardes College Prospectus 2014-15
Edwardes College Prospectus 2014-15diaryinc
 
The Role of the Library in Promoting Student in Learning
The Role of the Library in Promoting Student in LearningThe Role of the Library in Promoting Student in Learning
The Role of the Library in Promoting Student in Learningdiaryinc
 
Bank al habib Financial Statement.
Bank al habib Financial Statement.Bank al habib Financial Statement.
Bank al habib Financial Statement.diaryinc
 
Economic history of Pakistan.
Economic history of Pakistan.Economic history of Pakistan.
Economic history of Pakistan.diaryinc
 
Use of library by the students
 Use of library by the students Use of library by the students
Use of library by the studentsdiaryinc
 
Complete History of Pakistan
Complete History of PakistanComplete History of Pakistan
Complete History of Pakistandiaryinc
 
Black Magic & Fake Pir in Pakistan.
Black Magic & Fake Pir in Pakistan.Black Magic & Fake Pir in Pakistan.
Black Magic & Fake Pir in Pakistan.diaryinc
 
Role Of Industries In The Economy Of Pakistan
Role Of Industries In The Economy Of Pakistan Role Of Industries In The Economy Of Pakistan
Role Of Industries In The Economy Of Pakistan diaryinc
 
Technology and its impact on industrial world
Technology and its impact on industrial worldTechnology and its impact on industrial world
Technology and its impact on industrial worlddiaryinc
 
Economic Condition of Afghanistan
Economic Condition of Afghanistan Economic Condition of Afghanistan
Economic Condition of Afghanistan diaryinc
 
PEPSI VS COCA COLA
PEPSI VS COCA COLAPEPSI VS COCA COLA
PEPSI VS COCA COLAdiaryinc
 

Mais de diaryinc (20)

Nationalization Act In Pakistan
Nationalization Act In PakistanNationalization Act In Pakistan
Nationalization Act In Pakistan
 
SUMMARY OF “EVOLUTION OF MANAGEMENT THINKING”
SUMMARY OF “EVOLUTION OF MANAGEMENT THINKING”SUMMARY OF “EVOLUTION OF MANAGEMENT THINKING”
SUMMARY OF “EVOLUTION OF MANAGEMENT THINKING”
 
PURPOSE OF GOALS & PLANS
PURPOSE OF GOALS & PLANSPURPOSE OF GOALS & PLANS
PURPOSE OF GOALS & PLANS
 
STRATEGY FORMULATION AND IMPLEMENTATION
STRATEGY FORMULATION AND IMPLEMENTATIONSTRATEGY FORMULATION AND IMPLEMENTATION
STRATEGY FORMULATION AND IMPLEMENTATION
 
Pakistan state Oil (PSO)
Pakistan state Oil (PSO)Pakistan state Oil (PSO)
Pakistan state Oil (PSO)
 
Business plan of YOGA INSTITUTE
Business plan of YOGA INSTITUTE Business plan of YOGA INSTITUTE
Business plan of YOGA INSTITUTE
 
Business plan for " A CHILDCARE CENTER IN PESHAWAR"
Business plan for " A CHILDCARE CENTER IN PESHAWAR"Business plan for " A CHILDCARE CENTER IN PESHAWAR"
Business plan for " A CHILDCARE CENTER IN PESHAWAR"
 
Financial accounting solution manual
Financial accounting solution manualFinancial accounting solution manual
Financial accounting solution manual
 
Nts book-for-gat-general
Nts book-for-gat-generalNts book-for-gat-general
Nts book-for-gat-general
 
Edwardes College Prospectus 2014-15
Edwardes College Prospectus 2014-15Edwardes College Prospectus 2014-15
Edwardes College Prospectus 2014-15
 
The Role of the Library in Promoting Student in Learning
The Role of the Library in Promoting Student in LearningThe Role of the Library in Promoting Student in Learning
The Role of the Library in Promoting Student in Learning
 
Bank al habib Financial Statement.
Bank al habib Financial Statement.Bank al habib Financial Statement.
Bank al habib Financial Statement.
 
Economic history of Pakistan.
Economic history of Pakistan.Economic history of Pakistan.
Economic history of Pakistan.
 
Use of library by the students
 Use of library by the students Use of library by the students
Use of library by the students
 
Complete History of Pakistan
Complete History of PakistanComplete History of Pakistan
Complete History of Pakistan
 
Black Magic & Fake Pir in Pakistan.
Black Magic & Fake Pir in Pakistan.Black Magic & Fake Pir in Pakistan.
Black Magic & Fake Pir in Pakistan.
 
Role Of Industries In The Economy Of Pakistan
Role Of Industries In The Economy Of Pakistan Role Of Industries In The Economy Of Pakistan
Role Of Industries In The Economy Of Pakistan
 
Technology and its impact on industrial world
Technology and its impact on industrial worldTechnology and its impact on industrial world
Technology and its impact on industrial world
 
Economic Condition of Afghanistan
Economic Condition of Afghanistan Economic Condition of Afghanistan
Economic Condition of Afghanistan
 
PEPSI VS COCA COLA
PEPSI VS COCA COLAPEPSI VS COCA COLA
PEPSI VS COCA COLA
 

Último

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Último (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 

Data Communication Topologies

  • 2. reCAp Of LeCTUre 2reCAp Of LeCTUre 2 • Key DataCommunication Terminology • DataFlow/ Transmission Modes • Networksand Why weneed Them? • Distributed Processing • Network Criteria • Physical structureof Network • Typeof connection
  • 3. OvervIew Of LeCTUre 3OvervIew Of LeCTUre 3 • Physical Structureof Network • Physical Topologies 1. Bus 2. Mesh 3. Star 4. Ring 5. Tree 6. Hybrid
  • 4. TOpOLOgy “The Topology is the geometric representation of the relationship of the links and linking devices” OR “Topology defines physical or logical arrangement of links in a Network”
  • 5. TOpOLOgy (CONT.) • The ways in which the wires can be run in the network to link with thecomputer. • The ways in which the connections are made in the network. • Simply Thephysical layout of thenetwork.
  • 8. BUs TOpOLOgy (CONT.) • Structure • A bustopology, ismultipoint. • Onelong cableactsasabackboneto link all thedevicesin anetwork. • Nodesareconnected to thebuscableby drop linesand taps. • A drop line is a connection running between the device and the main cable. • A tap is a connector that either splices into the main cable or punctures thesheathing of acableto createacontact with themetallic core. • As a signal travels along the backbone, some of its energy is transformed into heat. Therefore, it becomes weaker and weaker as it travels farther and farther. For this reason there is a limit on the number of taps a bus can support and on thedistancebetween thosetaps.
  • 9. BUs TOpOLOgy (CONT.) • In abusnetwork every workstation needs • BNC Barrel Connectors • T-Connectors • Terminators • NIC. • T-Connectors are used to provide connection from the bus link to a workstation. • NIC (Network Interface Card) is used to link a workstation with the network. • Barrel Connectors are used to connect two parts of a cable either broken or when additional wireisrequired. • Terminators areused for Termination purpose. • Basically Thin Coaxial Cableisused in thistopology.
  • 10. BUs TOpOLOgy (CONT.) • Uses: • It is often used when network installation is small, simply or temporary. • Busisapassivetopology, • i.e. no activeelectron isused to amplify thesignal.
  • 11. Bus Topology (ConT.) • WORKING: • Broadcast network • all the computers on the network receive the information, but only one computer (the one with the address that matches the oneencoded in themessage) acceptstheinformation. Therest disregardsthemessage. • Protocol used is CSMA/CD (Carrier Sense Multiple Access with Collision Detection), • i.e. only one device can transmit the data at a time. More than one signal introduces collision. It means if one computer sends a signal over the bus; the other computer must wait for sometime.
  • 12. Bus Topology (ConT.) Another important issuein busnetwork istermination. Without termination, when thesignal reachestheend of the wire, it bounces back and travels back up the wire which makesthenetwork busy. To stop the bouncing signal, we attach terminators at either end of segment. The terminator absorbs the electrical energy and stops the reflection. Example ○ Ethernet10Base2, 10Base5, and ARC Net.
  • 13. Bus Topology (ConT.) • ADVANTAGES • popular because its working requirements are comparatively simple, and growth is accomplished easily and quickly. • Easy to useand understand. • It isreliablein small networks. • Repeater can beused to extend thenetwork. • It requiresleast amount of cable. • It islessexpensivein cost.
  • 14. Bus Topology (ConT.) • DISADVANTAGES • Heavy network traffic can slow the Bus, considerably (morecollision, morewaiting time). • Each BNC Barrel connecter weakens the signals as it absorbsenergy for itsown charge. • Difficult to troubleshoot and maintain because of cable break, looseconnector, and malfunctioning computer. • Singlecomputer failuredisturbsthewholenetwork. • Not a good choice for large organizations, because of slow datatraffic.
  • 16. Mesh Topology (ConT.) • In a mesh topology, every device has a dedicated point-to-point link to every other device. • The term dedicated means that the link carries traffic only between thetwo devicesit connects. • Primarily used in networksthat aremostly not LANs. • Madeup of multiplepoint to point connections. • Mesh networks can get complicated very quickly, because many connectionsmust bemanaged in anetwork of any size. • Mesh topology haveredundant linksbetween devices. • Each workstation is connected with a multi-port device like HUB that broadcaststhedata. • Therearetwo typesof Mesh, i.e. • TrueMesh • HybridMesh
  • 17. Mesh Topology (ConT.) • TRUEMESH • A true Mesh has a link between each device in the network. • It meansthat network isfully connected. • A true mesh of six devices requires fifteen connections (5 x 6)/2 = 15 links and that for seven devices requires 21 links. • The formula for finding total links in a true mesh is [n * (n– 1)] /2, wherenistotal number of workstations.
  • 18. Mesh Topology (ConT.) • HYBRIDMESH • Hybrid Mesh has extra links but not fully connected. Most Mesh topology networks are Hybrid Mesh networks.
  • 19. links and porTs in Mesh Topology • Number of Linksrequired to connect ‘n’ devices: n(n-1)/2 • Number of I/O Ports: n-1 • In figureabove, wehave5 Nodes, therefore: • No. of Links= 5(5-1)/2 = 10 • No. of I/O Ports= 5-1 = 4
  • 20. Mesh Topology (ConT.) • ADVANTAGES • Each dedicated connection can carry its own data load, thuseliminating thetraffic problems. • It is robust. If one link becomes unusable, it does not incapacitatetheentiresystem. • privacy or security. Physical boundaries prevent other usersfrom gaining accessto messages. • Point-to-point links make fault identification and fault isolation easy.
  • 21. Mesh Topology (ConT.) • DISADVANTAGES: • Amount of cabling and thenumber of I/O portsrequired • Installation and reconnection aredifficult. • The sheer bulk of the wiring can be greater than the available space (in walls, ceilings, or floors) can accommodate. • The hardware required to connect each link (I/O ports and cable) can beprohibitively expensive.
  • 23. sTar Topology (ConT.) • Most commonly used network topology • STRUCTURE: • Each device has a dedicated point-to-point link only to a central controller, usually called ahub or switch. • Thedevicesarenot directly linked to oneanother. • Unlike a mesh topology, a star topology does not allow direct traffic between devices. • The controller acts as an exchange: If one device wants to send data to another, it sends the data to the controller, which then relaysthedatato theother connected device.
  • 24. sTar Topology (ConT.) • WORKING: • Each computer on star network communicates with a Hub, that resend the message either to all computers which is called Broadcasting Star or only to the destination nodewhich iscalled Switched Star. • Now-a-daysmost of Switched Star networksuseSwitches instead of Intelligent Hubs because switches are less expensivethan Intelligent hubs.
  • 25. sTar Topology (ConT.) • ADVANTAGES: • Easy modification and expansion, without disturbing rest of the network. • Singlecomputer failuredoesnot affect thewholenetwork. • Support of several cablestypesin thesamenetwork. • Most flexibleof thethreetopologiesand easiest to diagnose. • It islessexpensivethan amesh topology. • Each device needs only one link and one I/O port to connect it to any number of others. • Thisfactor also makesit easy to install and reconfigure. • Far lesscabling needed ascompareto mesh topology. • Robustness. If one link fails, only that link is affected. All other links remain active. This factor also lends itself to easy fault identification and fault isolation.
  • 26. sTar Topology (ConT.) • DISADVANTAGES: • Dependency of the whole topology on one single point, thehub. If thehub goesdown, thewholesystem isdead. • More cables are required as compare to Bus and Ring topology and also Hub isexpensive.
  • 28. rIng TopologyrIng Topology • Each device has a dedicated point-to-point connection with only thetwo deviceson either sideof it. • A signal is passed along the ring in one direction, from device to device, until it reachesitsdestination. • Each device in the ring incorporates a repeater. When a device receives a signal intended for another device, its repeater regeneratesthebitsand passesthem along • Cable may be Coaxial with connectors or may be twisted pair with aHUB. Commonly Twisted Pair cableisused. • Thereisno termination becausethereisno end to thering.
  • 30. rIng Topology • Working: • For data transmission, medium access is required that is done by Token and thetechniqueisknown asToken Passing. • Token is a short message that is passed around the ring until a computer wishes to sends information to another computer, That computer modifies thetoken, addsan electronic address& data, and sendsit around thering. • Each computer in sequence receives the token and the information and passes them to the next computer until either the electronic address matches the address of a computer or the token returns to its origin. The receiving computer returns a message to the originator indicating that the messagehasbeen received. • The sending computer then creates the token and begins transmitting. The token circulatesuntil astation isready to send and capturesthetoken.
  • 31. RING TOPOLOGY • This all happens very quickly, a token can circle a ring 200 meters in diameter at about 10,000 times a second. Some faster networkscirculateseveral tokensat once. • Transmitted data moves in clockwise direction therefore there isno chanceof collision. • Example: FDDI is a fast fiber-optic network based on the ring topology. Token ring isanother ring based network.
  • 32. RING TOPOLOGYRING TOPOLOGY • ADVANTAGES: • It eliminates LANs depending on a central computer by distributing someof thecentral systemsresponsibility to all theother connected workstation. • Every workstation on the ring listens to see if the network is clear before sending a message. This helps avoiding collision between themessages. • The network degrades gracefully as more users we added i.e. thenetwork doesn’t failed.
  • 33. RING TOPOLOGYRING TOPOLOGY • DISADVANTAGES: • Failure of one computer on the ring can affect the whole network. • Also difficult to troubleshoot. • Adding or removing nodesdisturb thenetwork.
  • 35. hYbRId TOPOLOGY:hYbRId TOPOLOGY: a sTaR backbONe wITh ThRee bus NeTwORksa sTaR backbONe wITh ThRee bus NeTwORks
  • 36. summaRYsummaRY • Physical Structureof Network • Physical Topologies 1. Bus 2. Mesh 3. Star 4. Ring 5. Tree 6. Hybrid
  • 37. suGGesTed ReadINGsuGGesTed ReadING • Section – 1.2 • “Data Communications and Networking” 4th Edition by Behrouz A. Forouzan