SlideShare uma empresa Scribd logo
1 de 15
Baixar para ler offline
COMPUTER NETWORK
TOPOLOGIES
• A network topology is the
arrangement with which
computer systems or
network devices are
connected to each other.
types
Point-to-Point
BusTopology
Star Topology
Ring Topology
Mesh Topology
Tree Topology
Hybrid Topology
Daisy Chain
1.POINT-TO-POINT
• Point-to-point networks contains exactly two hosts such as computer, switches or routers, servers
connected back to back using a single piece of cable.
• Often, the receiving end of one host is connected to sending end of the other and vice-versa.
• The simplest topology with a dedicated link between two endpoints. Easiest to understand, of the
variations of point-to-point topology, is a point-to-point communication channel that appears, to the
user, to be permanently associated with the two endpoints.
• A child's tin can telephone is one example of a physical dedicated channel
2.BUS TOPOLOGY
• In case of bus topology, all devices share single communication line or cable.
• Bus topology may have problem while multiple hosts sending data at the same time.
Therefore, bus topology either uses CSMA/CD technology or recognizes one host as
bus master to solve the issue.
• It is one of the simple forms of networking where a failure of a device does not affect the
other devices. But failure of the shared communication line can make all other devices
stop functioning.
• Both ends of the shared channel have line terminator.
• The data is sent in only one direction and as soon as it reaches the extreme end, the
terminator removes the data from the line.
3.STAR TOPOLOGY
• All hosts in star topology are connected to a central device, known as hub device, using
a point-to-point connection. That is, there exists a point to point connection between
hosts and hub.
• As in bus topology, hub acts as single point of failure. If hub fails, connectivity of all hosts
to all other hosts fails.
• Every communication between hosts, takes place through only the hub.Star topology is
not expensive as to connect one more host, only one cable is required and configuration
is simple.
4.RING TOPOLOGY
• In ring topology, each host machine connects to exactly two other machines, creating a circular network
structure.
• When one host tries to communicate or send message to a host which is not adjacent to it, the data travels
through all intermediate hosts.
• To connect one more host in the existing structure, the administrator may need only one more extra cable.
• Failure of any host results in failure of the whole ring.Thus, every connection in the ring is a point of failure.
There are methods which employ one more backup ring.
5.MESH TOPOLOGY
• In this type of topology, a host is connected to one or multiple hosts.
• This topology has hosts in point-to-point connection with every other host or may also have hosts
which are in point-to-point connection to few hosts only.
• Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to-point
links.
• Mesh technology comes into two types:
• Full Mesh: All hosts have a point-to-point connection to every other host in the network. Thus for
every new host n(n-1)/2 connections are required. It provides the most reliable network structure
among all network topologies.
• Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts connect
to each other in some arbitrarily fashion. This topology exists where we need to provide reliability
to some hosts out of all.
6.TREE TOPOLOGY
• Also known as Hierarchical Topology, this is the most common form of network topology in
use presently.
• This topology imitates as extended Star topology and inherits properties of bus topology.
• This topology divides the network in to multiple levels/layers of network. Mainly in LANs, a
network is bifurcated into three types of network devices.
• The middle layer is known as distribution layer, which works as mediator between upper
layer and lower layer.
• The highest layer is known as core layer, and is central point of the network, i.e. root of the
tree from which all nodes fork.
• All neighboring hosts have point-to-point connection between them.
• Similar to the Bus topology, if the root goes down, then the entire network suffers
even.though it is not the single point of failure. Every connection serves as point of failure,
failing of which divides the network into unreachable segment.
7.DAISY CHAIN
• This topology connects all the hosts in a linear fashion. Similar to Ring topology, all hosts are
connected to two hosts only, except the end hosts.
• Means, if the end hosts in daisy chain are connected then it represents Ring topology.
• Each link in daisy chain topology represents single point of failure. Every link failure splits the
network into two segments.
• Every intermediate host works as relay for its immediate hosts.
8.HYBRID TOPOLOGY
• A network structure whose design contains more than one topology is said to be hybrid
topology. Hybrid topology inherits merits and demerits of all the incorporating topologies.
• The above picture represents an arbitrarily hybrid topology.
• The combining topologies may contain attributes of Star, Ring, Bus, and Daisy-chain
topologies.
• Most WANs are connected by means of Dual-Ring topology and networks connected to them
are mostly Star topology networks. Internet is the best example of largest Hybrid topology

Mais conteúdo relacionado

Semelhante a Network Topologies.pptx

Semelhante a Network Topologies.pptx (20)

NETWORK TOPOLOGIES (NETWORK TOPOLOGY)
NETWORK TOPOLOGIES (NETWORK TOPOLOGY)NETWORK TOPOLOGIES (NETWORK TOPOLOGY)
NETWORK TOPOLOGIES (NETWORK TOPOLOGY)
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network topology ? Types of Network Toplogies:Bus, Ring, Mesh, Tree, Star, Hy...
Network topology ? Types of Network Toplogies:Bus, Ring, Mesh, Tree, Star, Hy...Network topology ? Types of Network Toplogies:Bus, Ring, Mesh, Tree, Star, Hy...
Network topology ? Types of Network Toplogies:Bus, Ring, Mesh, Tree, Star, Hy...
 
Topology.pptx
Topology.pptxTopology.pptx
Topology.pptx
 
NETWORK-TOPOLOGIES-VARIOUS-TOPOLOGIES.pptx
NETWORK-TOPOLOGIES-VARIOUS-TOPOLOGIES.pptxNETWORK-TOPOLOGIES-VARIOUS-TOPOLOGIES.pptx
NETWORK-TOPOLOGIES-VARIOUS-TOPOLOGIES.pptx
 
Computer Networks .ppt
Computer Networks .pptComputer Networks .ppt
Computer Networks .ppt
 
Computer Networks 1 .ppt
Computer Networks 1 .pptComputer Networks 1 .ppt
Computer Networks 1 .ppt
 
Network Topology
Network Topology Network Topology
Network Topology
 
pptx_20230209_042708_0000.pptx
pptx_20230209_042708_0000.pptxpptx_20230209_042708_0000.pptx
pptx_20230209_042708_0000.pptx
 
Dc lec-03 (topologies)
Dc lec-03  (topologies)Dc lec-03  (topologies)
Dc lec-03 (topologies)
 
Computer network
Computer networkComputer network
Computer network
 
Topology
TopologyTopology
Topology
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptxINTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
INTERNET NETWORK TOPOLOGY PRESENTATION POWERPOINT (ADITYA).pptx
 
Networks topologies Lec#2
Networks topologies Lec#2Networks topologies Lec#2
Networks topologies Lec#2
 
topology presentation.ppt
topology presentation.ppttopology presentation.ppt
topology presentation.ppt
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
NETWORK TOPOLOGY
NETWORK TOPOLOGYNETWORK TOPOLOGY
NETWORK TOPOLOGY
 
Week 5 lan topology part 2
Week 5 lan topology part 2Week 5 lan topology part 2
Week 5 lan topology part 2
 

Mais de karmaYonten5

Image operating.pptx
Image operating.pptxImage operating.pptx
Image operating.pptxkarmaYonten5
 
Troubleshooting.pptx
Troubleshooting.pptxTroubleshooting.pptx
Troubleshooting.pptxkarmaYonten5
 
WIN XP SP1,2,3.pptx
WIN XP SP1,2,3.pptxWIN XP SP1,2,3.pptx
WIN XP SP1,2,3.pptxkarmaYonten5
 
DZONGKHA UNICODE.pptx
DZONGKHA UNICODE.pptxDZONGKHA UNICODE.pptx
DZONGKHA UNICODE.pptxkarmaYonten5
 
software compatibility.pptx
software compatibility.pptxsoftware compatibility.pptx
software compatibility.pptxkarmaYonten5
 
INSTALL APLLICATION SOFTWARE.pptx
INSTALL APLLICATION SOFTWARE.pptxINSTALL APLLICATION SOFTWARE.pptx
INSTALL APLLICATION SOFTWARE.pptxkarmaYonten5
 
INSTALL WINDOW OS.ppt
INSTALL WINDOW OS.pptINSTALL WINDOW OS.ppt
INSTALL WINDOW OS.pptkarmaYonten5
 
CONFIGURE SOFTWARE, CONDUCT TEST.pptx
CONFIGURE SOFTWARE, CONDUCT TEST.pptxCONFIGURE SOFTWARE, CONDUCT TEST.pptx
CONFIGURE SOFTWARE, CONDUCT TEST.pptxkarmaYonten5
 
COUSTIMISE DISK PARTITION (1).pptx
COUSTIMISE DISK PARTITION  (1).pptxCOUSTIMISE DISK PARTITION  (1).pptx
COUSTIMISE DISK PARTITION (1).pptxkarmaYonten5
 
Backup Data (cloud storage).pptx
Backup Data (cloud storage).pptxBackup Data (cloud storage).pptx
Backup Data (cloud storage).pptxkarmaYonten5
 

Mais de karmaYonten5 (13)

Image operating.pptx
Image operating.pptxImage operating.pptx
Image operating.pptx
 
Troubleshooting.pptx
Troubleshooting.pptxTroubleshooting.pptx
Troubleshooting.pptx
 
Memory.pptx
Memory.pptxMemory.pptx
Memory.pptx
 
WIN XP SP1,2,3.pptx
WIN XP SP1,2,3.pptxWIN XP SP1,2,3.pptx
WIN XP SP1,2,3.pptx
 
DZONGKHA UNICODE.pptx
DZONGKHA UNICODE.pptxDZONGKHA UNICODE.pptx
DZONGKHA UNICODE.pptx
 
software compatibility.pptx
software compatibility.pptxsoftware compatibility.pptx
software compatibility.pptx
 
INSTALL APLLICATION SOFTWARE.pptx
INSTALL APLLICATION SOFTWARE.pptxINSTALL APLLICATION SOFTWARE.pptx
INSTALL APLLICATION SOFTWARE.pptx
 
INSTALL WINDOW OS.ppt
INSTALL WINDOW OS.pptINSTALL WINDOW OS.ppt
INSTALL WINDOW OS.ppt
 
CONFIGURE SOFTWARE, CONDUCT TEST.pptx
CONFIGURE SOFTWARE, CONDUCT TEST.pptxCONFIGURE SOFTWARE, CONDUCT TEST.pptx
CONFIGURE SOFTWARE, CONDUCT TEST.pptx
 
COUSTIMISE DISK PARTITION (1).pptx
COUSTIMISE DISK PARTITION  (1).pptxCOUSTIMISE DISK PARTITION  (1).pptx
COUSTIMISE DISK PARTITION (1).pptx
 
Backup Data (cloud storage).pptx
Backup Data (cloud storage).pptxBackup Data (cloud storage).pptx
Backup Data (cloud storage).pptx
 
OSI Model.pptx
OSI Model.pptxOSI Model.pptx
OSI Model.pptx
 
TCP&IP Model.pptx
TCP&IP Model.pptxTCP&IP Model.pptx
TCP&IP Model.pptx
 

Último

Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 

Último (20)

Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 

Network Topologies.pptx

  • 2. • A network topology is the arrangement with which computer systems or network devices are connected to each other. types Point-to-Point BusTopology Star Topology Ring Topology Mesh Topology Tree Topology Hybrid Topology Daisy Chain
  • 3. 1.POINT-TO-POINT • Point-to-point networks contains exactly two hosts such as computer, switches or routers, servers connected back to back using a single piece of cable. • Often, the receiving end of one host is connected to sending end of the other and vice-versa. • The simplest topology with a dedicated link between two endpoints. Easiest to understand, of the variations of point-to-point topology, is a point-to-point communication channel that appears, to the user, to be permanently associated with the two endpoints. • A child's tin can telephone is one example of a physical dedicated channel
  • 4. 2.BUS TOPOLOGY • In case of bus topology, all devices share single communication line or cable. • Bus topology may have problem while multiple hosts sending data at the same time. Therefore, bus topology either uses CSMA/CD technology or recognizes one host as bus master to solve the issue. • It is one of the simple forms of networking where a failure of a device does not affect the other devices. But failure of the shared communication line can make all other devices stop functioning.
  • 5. • Both ends of the shared channel have line terminator. • The data is sent in only one direction and as soon as it reaches the extreme end, the terminator removes the data from the line.
  • 6. 3.STAR TOPOLOGY • All hosts in star topology are connected to a central device, known as hub device, using a point-to-point connection. That is, there exists a point to point connection between hosts and hub.
  • 7. • As in bus topology, hub acts as single point of failure. If hub fails, connectivity of all hosts to all other hosts fails. • Every communication between hosts, takes place through only the hub.Star topology is not expensive as to connect one more host, only one cable is required and configuration is simple.
  • 8. 4.RING TOPOLOGY • In ring topology, each host machine connects to exactly two other machines, creating a circular network structure. • When one host tries to communicate or send message to a host which is not adjacent to it, the data travels through all intermediate hosts. • To connect one more host in the existing structure, the administrator may need only one more extra cable. • Failure of any host results in failure of the whole ring.Thus, every connection in the ring is a point of failure. There are methods which employ one more backup ring.
  • 9. 5.MESH TOPOLOGY • In this type of topology, a host is connected to one or multiple hosts. • This topology has hosts in point-to-point connection with every other host or may also have hosts which are in point-to-point connection to few hosts only. • Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to-point links. • Mesh technology comes into two types:
  • 10. • Full Mesh: All hosts have a point-to-point connection to every other host in the network. Thus for every new host n(n-1)/2 connections are required. It provides the most reliable network structure among all network topologies. • Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts connect to each other in some arbitrarily fashion. This topology exists where we need to provide reliability to some hosts out of all.
  • 11. 6.TREE TOPOLOGY • Also known as Hierarchical Topology, this is the most common form of network topology in use presently. • This topology imitates as extended Star topology and inherits properties of bus topology. • This topology divides the network in to multiple levels/layers of network. Mainly in LANs, a network is bifurcated into three types of network devices.
  • 12. • The middle layer is known as distribution layer, which works as mediator between upper layer and lower layer. • The highest layer is known as core layer, and is central point of the network, i.e. root of the tree from which all nodes fork. • All neighboring hosts have point-to-point connection between them. • Similar to the Bus topology, if the root goes down, then the entire network suffers even.though it is not the single point of failure. Every connection serves as point of failure, failing of which divides the network into unreachable segment.
  • 13. 7.DAISY CHAIN • This topology connects all the hosts in a linear fashion. Similar to Ring topology, all hosts are connected to two hosts only, except the end hosts. • Means, if the end hosts in daisy chain are connected then it represents Ring topology. • Each link in daisy chain topology represents single point of failure. Every link failure splits the network into two segments. • Every intermediate host works as relay for its immediate hosts.
  • 14. 8.HYBRID TOPOLOGY • A network structure whose design contains more than one topology is said to be hybrid topology. Hybrid topology inherits merits and demerits of all the incorporating topologies.
  • 15. • The above picture represents an arbitrarily hybrid topology. • The combining topologies may contain attributes of Star, Ring, Bus, and Daisy-chain topologies. • Most WANs are connected by means of Dual-Ring topology and networks connected to them are mostly Star topology networks. Internet is the best example of largest Hybrid topology