Network Topologies: Bus vs Ring

undefined
D
a
t
a
 
C
o
m
m
u
n
i
c
a
t
i
o
n
 
&
N
e
t
w
o
r
k
s
U
N
I
T
#
7
N
e
t
w
o
r
k
 
T
o
p
o
l
o
g
y
A Network 
Topology
 is the arrangement with which computer systems or
network devices are connected to each other.
In networking, 
topology
 refers to the layout of a computer network.
Topologies
 may define both physical and logical aspect of the network.
Both logical and physical 
topologies
 could be same or different in a same
network.
Physical 
topology
 means the placement of the elements of the network,
including the location of the devices or the layout of the cables.
T
y
p
e
s
 
o
f
 
T
o
p
o
l
o
g
i
e
s
B
u
s
 
T
o
p
o
l
o
g
y
Bus topology is a network type in which every computer and network device is connected to
single cable.
When it has exactly two endpoints, then it is called 
Linear Bus topology
.
Features of Bus Topology
1.
It transmits data only in one direction.
2.
Every device is connected to a single cable
Advantages of Bus Topology
1.
It is cost effective.
2.
Cable required is least compared to other network topology.
3.
Used in small networks.
4.
It is easy to understand.
5.
Easy to expand joining two cables together.
Disadvantages of Bus Topology
1.
Cables fails then whole network fails.
2.
If network traffic is heavy or nodes are more the performance of the network
decreases.
3.
Cable has a limited length.
4.
It is slower than the ring topology.
R
i
n
g
 
T
o
p
o
l
o
g
y
It is called ring topology because it forms a ring as each computer is
connected to another computer, with the last one connected to the
first.
Exactly two neighbors for each device.
undefined
Features of Ring Topology
1.
A number of repeaters are used for Ring topology with large number of nodes,
because if someone wants to send some data to the last node in the ring topology
with 100 nodes, then the data will have to pass through 99 nodes to reach the
100th node. Hence to prevent data loss repeaters are used in the network.
2.
The transmission is unidirectional, but it can be made bidirectional by having 2
connections between each Network Node, it is called 
Dual Ring Topology
.
3.
In Dual Ring Topology, two ring networks are formed, and data flow is in
opposite direction in them. Also, if one ring fails, the second ring can act as a
backup, to keep the network up.
4.
Data is transferred in a sequential manner that is bit by bit. Data transmitted, has
to pass through each node of the network, till the destination node.
A
d
v
a
n
t
a
g
e
 
&
 
D
i
s
a
d
v
a
n
t
a
g
e
 
Advantages of Ring Topology
1.
Transmitting network is not affected by high traffic or by adding more nodes, as
only the nodes having tokens can transmit data.
2.
Cheap to install and expand
 
Disadvantages of Ring Topology
1.
Troubleshooting is difficult in ring topology.
2.
Adding or deleting the computers disturbs the network activity.
3.
Failure of one computer disturbs the whole network.
S
t
a
r
 
T
o
p
o
l
o
g
y
In this type of topology all the computers are connected to a single hub through a cable.
This hub is the central node and all others nodes are connected to the central node.
Features of Star Topology
1.
Every node has its own dedicated connection to the hub.
2.
Hub acts as a repeater for data flow.
3.
Can be used with twisted pair, Optical Fibre or coaxial cable.
A
d
v
a
n
t
a
g
e
 
&
 
D
i
s
a
d
v
a
n
t
a
g
e
 
Advantages of Star Topology
1.
Fast performance with few nodes and low network traffic.
2.
Hub can be upgraded easily.
3.
Easy to troubleshoot.
4.
Easy to setup and modify.
5.
Only that node is affected which has failed, rest of the nodes can work smoothly.
 
Disadvantages of Star Topology
1.
Cost of installation is high.
2.
Expensive to use.
3.
If the hub fails then the whole network is stopped because all the nodes depend on the hub.
4.
Performance is based on the hub that is it depends on its capacity
M
e
s
h
 
T
o
p
o
l
o
g
y
mesh topology
 is a network setup where each computer and
network device is interconnected with one another. 
This 
topology
 setup allows for most transmissions to be distributed
even if one of the connections goes down.
 It is a 
topology
 commonly used for wireless networks.
undefined
A
d
v
a
n
t
a
g
e
 
T
y
p
e
s
 
o
f
 
N
e
t
w
o
r
k
LAN
WAN
MAN
 
P
r
o
p
e
r
t
i
e
s
 
o
f
 
L
A
N
 
M
A
N
 
W
A
N
 
C
o
m
m
u
n
i
c
a
t
i
o
n
 
p
r
o
t
o
c
o
l
F
u
n
c
t
i
o
n
s
 
o
f
 
c
o
m
m
u
n
i
c
a
t
i
o
n
 
p
r
o
t
o
c
o
l
O
S
I
 
M
o
d
e
l
 
 
Physical Layer
The physical layer helps you to define the electrical and physical specifications of the data
connection.
This level establishes the relationship between a device and a physical transmission medium.
The physical layer is not concerned with protocols or other such higher-layer items.
Examples of hardware in the physical layer are network adapters, ethernet, repeaters, networking
hubs, etc.
Data Link Layer:
Data link layer corrects errors which can occur at the physical layer.
The layer allows you to define the protocol to establish and terminates a connection between two
connected network devices.
It is IP address understandable layer, which helps you to define logical addressing so that any
endpoint should be identified.
The layer also helps you implement routing of packets through a network.
 It helps you to define the best path, which allows you to take data from the source to the
destination.
The data link layer is subdivided into two types of sublayers:
Media Access Control (MAC) layer- 
It is responsible for controlling how device in a network gain
access to medium and permits to transmit data.
Logical link control layer- 
This layer is responsible for identity and encapsulating network-layer
protocols and allows you to find the error.
Transport Layer:
The transport layer builds on the network layer to provide data transport from a process on a
source machine to a process on a destination machine.
 It is hosted using single or multiple networks, and also maintains the quality of service functions.
It determines how much data should be sent where and at what rate.
This layer builds on the message which are received from the application layer.
It helps ensure that data units are delivered error-free and in sequence.
Transport layer helps you to control the reliability of a link through flow control, error control,
and segmentation or desegmentation.
The transport layer also offers an acknowledgment of the successful data transmission and sends
the next data in case no errors occurred.
TCP is the best-known example of the transport layer.
Network Layer:
The network layer provides the functional and procedural means of transferring variable length
data sequences from one node to another connected in "different networks".
Message delivery at the network layer does not give any guaranteed to be reliable network layer
protocol.
 
Layer-management protocols that belong to the network layer are:
1.
routing protocols
2.
multicast group management
3.
network-layer address assignment.
Session Layer
Session Layer controls the dialogues between computers.
 It helps you to establish starting and terminating the connections between the local and remote
application.
This layer request for a logical connection which should be established on end user's requirement.
This layer handles all the important log-on or password validation.
Session layer offers services like dialog discipline, which can be duplex or half-duplex.
It is mostly implemented in application environments that use remote procedure calls.
 
Important function of Session Layer:
It establishes, maintains, and ends a session.
Session layer enables two systems to enter into a dialog
It also allows a process to add a checkpoint to steam of data.
Presentation Layer
Presentation layer allows you to define the form in which the data is to exchange between the two
communicating entities.
It also helps you to handles data compression and data encryption.
This layer transforms data into the form which is accepted by the application.
It also formats and encrypts data which should be sent across all the networks.
This layer is also known as a 
syntax layer
.
 
The function of Presentation Layers:
Character code translation from ASCII to EBCDIC.
Data compression: Allows to reduce the number of bits that needs to be transmitted on the network.
Data encryption: Helps you to encrypt data for security purposes — for example, password encryption.
It provides a user interface and support for services like email and file transfer.
Application Layer
Application layer interacts with an application program, which is the highest level of OSI model.
 The application layer is the OSI layer, which is closest to the end-user.
It means OSI application layer allows users to interact with other software application.
Application layer interacts with software applications to implement a communicating component.
The interpretation of data by the application program is always outside the scope of the OSI model.
 
Example of the application layer is an application such as file transfer, email, remote login, etc.
 
The function of the Application Layers are:
Application-layer helps you to identify communication partners, determining resource availability, and
synchronizing communication.
It allows users to log on to a remote host
This layer provides various e-mail services
 
N
e
t
w
o
r
k
 
i
n
t
e
r
f
a
c
e
 
C
a
r
d
undefined
M
u
l
t
i
m
e
d
i
a
UNIT#8
I
n
t
r
o
d
u
c
t
i
o
n
 
t
o
 
m
u
l
t
i
m
e
d
i
a
I
n
t
r
o
d
u
c
t
i
o
n
 
t
o
 
m
u
l
t
i
m
e
d
i
a
I
n
t
r
o
d
u
c
t
i
o
n
 
t
o
 
m
u
l
t
i
m
e
d
i
a
 
M
u
l
t
i
m
e
d
i
a
 
c
o
m
p
o
n
e
n
t
s
T
e
x
t
T
e
x
t
G
r
a
p
h
i
c
s
P
r
o
p
e
r
t
i
e
s
 
o
f
 
G
r
a
p
h
i
c
s
A
n
i
m
a
t
i
o
n
C
h
a
r
a
c
t
e
r
i
s
t
i
c
s
 
o
f
 
M
u
l
t
i
m
e
d
i
a
V
i
d
e
o
A
u
d
i
o
M
u
l
t
i
m
e
d
i
a
 
A
p
p
l
i
c
a
t
i
o
n
s
Multimedia Application
 is an 
Application
 which uses a
collection of multiple 
media
 sources e.g. text, graphics, images,
sound/audio, animation and/or video.
 Hypermedia can be considered as one of the 
multimedia
applications
.
M
u
l
t
i
m
e
d
i
a
 
P
r
e
s
e
n
t
a
t
i
o
n
multimedia presentation
 is a stand alone 
presentation
 that
includes information presented with slides, video, or digital
representations and includes sound which might be a narrative, music
or sound effects.
The 
Multimedia Presentation
 is part of the 
Presentations
 Contest
at the County and State.
F
o
r
e
i
g
n
 
L
a
n
g
u
a
g
e
 
L
e
a
r
n
i
n
g
F
o
r
e
i
g
n
 
L
a
n
g
u
a
g
e
 
L
e
a
r
n
i
n
g
A
n
i
m
a
t
e
d
 
A
d
v
e
r
t
i
s
e
m
e
n
t
M
u
l
t
i
m
e
d
i
a
 
C
o
n
f
e
r
e
n
c
i
n
g
V
i
d
e
o
 
G
a
m
e
s
T
y
p
e
s
 
o
f
 
V
i
d
e
o
 
G
a
m
e
s
S
p
e
c
i
a
l
 
E
f
f
e
c
t
s
 
i
n
 
M
o
v
i
e
s
M
u
l
t
i
m
e
d
i
a
 
K
i
o
s
k
M
u
l
t
i
m
e
d
i
a
 
K
i
o
s
k
M
e
d
i
a
 
C
e
n
t
e
r
 
C
o
m
p
u
t
e
r
C
h
a
r
a
c
t
e
r
i
s
t
i
c
s
M
e
d
i
a
 
C
e
n
t
e
r
 
C
o
m
p
u
t
e
r
undefined
I
n
t
r
o
d
u
c
t
i
o
n
 
t
o
c
o
m
p
u
t
e
r
 
L
a
n
g
u
a
g
e
s
UNIT#9
P
r
o
g
r
a
m
m
i
n
g
 
L
a
n
g
u
a
g
e
C
o
m
p
u
t
e
r
 
P
r
o
g
r
a
m
T
y
p
e
s
L
o
w
 
L
e
v
e
l
 
L
a
n
g
u
a
g
e
T
y
p
e
 
o
f
 
L
o
w
 
L
e
v
e
l
 
L
a
n
g
u
a
g
e
T
y
p
e
 
o
f
 
L
o
w
 
L
e
v
e
l
 
L
a
n
g
u
a
g
e
T
y
p
e
 
o
f
 
L
o
w
 
L
e
v
e
l
 
L
a
n
g
u
a
g
e
T
y
p
e
 
o
f
 
L
o
w
 
L
e
v
e
l
 
L
a
n
g
u
a
g
e
A
s
s
e
m
b
l
y
 
L
a
n
g
u
a
g
e
A
s
s
e
m
b
l
y
 
L
a
n
g
u
a
g
e
A
d
v
a
n
t
a
g
e
 
&
 
D
i
s
a
d
v
a
n
t
a
g
e
H
i
g
h
 
l
e
v
e
l
 
l
a
n
g
u
a
g
e
 
C
o
m
p
i
l
e
r
I
n
t
e
r
p
r
e
t
e
r
L
i
n
k
e
r
l
a
n
g
u
a
g
e
 
G
e
n
e
r
a
t
i
o
n
s
 
l
a
n
g
u
a
g
e
 
G
e
n
e
r
a
t
i
o
n
s
 
There are five generation of Programming languages.They are:
First Generation Languages :
These are low-level languages like machine language.
Second Generation Languages :
These are low-level assembly languages used in kernels and hardware drives.
Third Generation Languages :
These are high-level languages like C, C++, Java, Visual Basic and JavaScript.
Fourth Generation Languages :
These are languages that consist of statements that are similar to statements in the human language.
These are used mainly in database programming and scripting. Example of these languages include
Perl, Python, Ruby, SQL, MatLab(MatrixLaboratory).
Fifth Generation Languages :
These are the programming languages that have visual tools to develop a program. Examples of fifth
generation language include Mercury, OPS5, and Prolog.
 
The first two generations are called low level languages. The next three generations are called high
level languages.
Slide Note
Embed
Share

Explore the world of network topologies with a focus on Bus and Ring configurations. Learn about their features, advantages, and disadvantages, helping you understand the layout and connectivity options in computer networks.

  • Network Topologies
  • Bus Topology
  • Ring Topology
  • Data Communication
  • Networking

Uploaded on Apr 16, 2024 | 7 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Data Communication & Data Communication & Networks Networks UNIT#7 UNIT#7

  2. Network Topology Network Topology A Network Topology is the arrangement with which computer systems or network devices are connected to each other. In networking, topology refers to the layout of a computer network. Topologies may define both physical and logical aspect of the network. Both logical and physical topologies could be same or different in a same network. Physical topology means the placement of the elements of the network, including the location of the devices or the layout of the cables.

  3. Types of Topologies Types of Topologies

  4. Bus Topology Bus Topology Bus topology is a network type in which every computer and network device is connected to single cable. When it has exactly two endpoints, then it is called Linear Bus topology.

  5. Features of Bus Topology 1.It transmits data only in one direction. 2.Every device is connected to a single cable

  6. Advantages of Bus Topology 1.It is cost effective. 2.Cable required is least compared to other network topology. 3.Used in small networks. 4.It is easy to understand. 5.Easy to expand joining two cables together.

  7. Disadvantages of Bus Topology 1.Cables fails then whole network fails. 2.If network traffic is heavy or nodes are more the performance of the network decreases. 3.Cable has a limited length. 4.It is slower than the ring topology.

  8. Ring Topology Ring Topology It is called ring topology because it forms a ring as each computer is connected to another computer, with the last one connected to the first. Exactly two neighbors for each device.

  9. Features of Ring Topology 1.A number of repeaters are used for Ring topology with large number of nodes, because if someone wants to send some data to the last node in the ring topology with 100 nodes, then the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss repeaters are used in the network. 2.The transmission is unidirectional, but it can be made bidirectional by having 2 connections between each Network Node, it is called Dual Ring Topology. 3.In Dual Ring Topology, two ring networks are formed, and data flow is in opposite direction in them. Also, if one ring fails, the second ring can act as a backup, to keep the network up. 4.Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass through each node of the network, till the destination node.

  10. Advantage & Disadvantage Advantage & Disadvantage Advantages of Ring Topology 1.Transmitting network is not affected by high traffic or by adding more nodes, as only the nodes having tokens can transmit data. 2.Cheap to install and expand Disadvantages of Ring Topology 1.Troubleshooting is difficult in ring topology. 2.Adding or deleting the computers disturbs the network activity. 3.Failure of one computer disturbs the whole network.

  11. Star Topology Star Topology In this type of topology all the computers are connected to a single hub through a cable. This hub is the central node and all others nodes are connected to the central node.

  12. Features of Star Topology 1.Every node has its own dedicated connection to the hub. 2.Hub acts as a repeater for data flow. 3.Can be used with twisted pair, Optical Fibre or coaxial cable.

  13. Advantage & Disadvantage Advantage & Disadvantage Advantages of Star Topology 1.Fast performance with few nodes and low network traffic. 2.Hub can be upgraded easily. 3.Easy to troubleshoot. 4.Easy to setup and modify. 5.Only that node is affected which has failed, rest of the nodes can work smoothly. Disadvantages of Star Topology 1.Cost of installation is high. 2.Expensive to use. 3.If the hub fails then the whole network is stopped because all the nodes depend on the hub. 4.Performance is based on the hub that is it depends on its capacity

  14. Mesh Topology Mesh Topology A mesh topology is a network setup where each computer and network device is interconnected with one another. This topology setup allows for most transmissions to be distributed even if one of the connections goes down. It is a topology commonly used for wireless networks.

  15. Advantage Advantage

  16. Types of Network Types of Network LAN WAN MAN

  17. Properties of LAN Properties of LAN

  18. MAN MAN

  19. WAN WAN

  20. Communication protocol Communication protocol

  21. Functions of communication protocol Functions of communication protocol

  22. OSI Model OSI Model

  23. Physical Layer The physical layer helps you to define the electrical and physical specifications of the data connection. This level establishes the relationship between a device and a physical transmission medium. The physical layer is not concerned with protocols or other such higher-layer items. Examples of hardware in the physical layer are network adapters, ethernet, repeaters, networking hubs, etc.

  24. Data Link Layer: Data link layer corrects errors which can occur atthephysical layer. The layer allows you to define the protocol to establish and terminates a connection between two connectednetwork devices. It is IP address understandable layer, which helps you to define logical addressing so that any endpointshould be identified. Thelayer also helps youimplement routingofpackets through a network. It helps you to define the best path, which allows you to take data from the source to the destination. The datalinklayerissubdividedintotwotypesofsublayers: Media Access Control (MAC) layer- It is responsible for controlling how device in a network gain access tomedium andpermits totransmit data. Logical link control layer- This layer is responsible for identity and encapsulating network-layer protocolsand allows youtofindtheerror.

  25. Transport Layer: The transport layer builds on the network layer to provide data transport from a process on a source machine to a process on a destination machine. It is hosted using single or multiple networks, and also maintains the quality of service functions. It determines how much data should be sent where and at what rate. This layer builds on the message which are received from the application layer. It helps ensure that data units are delivered error-free and in sequence. Transport layer helps you to control the reliability of a link through flow control, error control, and segmentation or desegmentation. The transport layer also offers an acknowledgment of the successful data transmission and sends the next data in case no errors occurred. TCP is the best-known example of the transport layer.

  26. Network Layer: The network layer provides the functional and procedural means of transferring variable length data sequences from one node to another connected in "different networks". Message delivery at the network layer does not give any guaranteed to be reliable network layer protocol. Layer-management protocols that belong to the network layer are: 1.routing protocols 2.multicast group management 3.network-layer address assignment.

  27. Session Layer Session Layer controls the dialogues between computers. It helps you to establish starting and terminating the connections between the local and remote application. This layer request for a logical connection which should be established on end user's requirement. This layer handles all the important log-on or password validation. Session layer offers services like dialog discipline, which can be duplex or half-duplex. It is mostly implemented in application environments that use remote procedure calls. Important function of Session Layer: It establishes, maintains, and ends a session. Session layer enables two systems to enter into a dialog It also allows a process to add a checkpoint to steam of data.

  28. Presentation Layer Presentation layer allows you to define the form in which the data is to exchange between the two communicating entities. It also helps you to handles data compression and data encryption. This layer transforms data into the form which is accepted by the application. It also formats and encrypts data which should be sent across all the networks. This layer is also known as a syntax layer. The function of Presentation Layers: Character code translation fromASCII to EBCDIC. Data compression: Allows to reduce the number of bits that needs to be transmitted on the network. Data encryption: Helps you to encrypt data for security purposes for example, password encryption. It provides a user interface and support for services like email and file transfer.

  29. Application Layer Application layer interacts with an application program, which is the highest level of OSI model. The application layer is the OSI layer, which is closest to the end-user. It means OSI application layer allows users to interact with other software application. Application layer interacts with software applications to implement a communicating component. The interpretation of data by the application program is always outside the scope of the OSI model. Example of the application layer is an application such as file transfer, email, remote login, etc. The function of theApplication Layers are: Application-layer helps you to identify communication partners, determining resource availability, and synchronizing communication. It allows users to log on to a remote host This layer provides various e-mail services

  30. Layer Layer 7 Name Application Function To allow access to network resources. To translate, encrypt and compress data. To establish, manage, and terminate the session The transport layer builds on the network layer to provide data transport from a process on a source machine to a process on a destination machine. Protocols SMTP, HTTP, FTP, POP3, SNMP MPEG, ASCH, SSL, TLS Layer 6 Presentation Layer 5 Session NetBIOS, SAP Layer 4 Transport TCP, UDP

  31. Layer 3 Network To provide internetworking To move packets from source to destination To organize bits into frames To provide hop- to-hop delivery To transmit bits over a medium To provide mechanical and electrical specifications IPV5, IPV6, ICMP, IPSEC, ARP, MPLS. Layer 2 Data Link RAPA, PPP, Frame Relay, ATM, Fiber Cable, etc. RS232, 100BaseTX, ISDN, 11. Layer 1 Physical

  32. Network interface Card Network interface Card

  33. Multimedia Multimedia UNIT#8

  34. Introduction to multimedia Introduction to multimedia

  35. Introduction to multimedia Introduction to multimedia

  36. Introduction to multimedia Introduction to multimedia

  37. Multimedia components Multimedia components

  38. Text Text

  39. Text Text

  40. Graphics Graphics

  41. Properties of Graphics Properties of Graphics

  42. Animation Animation

  43. Characteristics of Multimedia Characteristics of Multimedia

  44. Video Video

  45. Audio Audio

  46. Multimedia Applications Multimedia Applications A Multimedia Application is an Application which uses a collection of multiple media sources e.g. text, graphics, images, sound/audio, animation and/or video. Hypermedia can be considered as one of the multimedia applications.

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#