Professional Documents
Culture Documents
Network & Topologies
Network & Topologies
Network & Topologies
NETWORK
A computer network is a set of computers sharing resources located on or provided by network nodes.
The computers use common communication protocols over digital interconnections to communicate
with each other. These interconnections are made up of telecommunication network technologies,
based on physically wired, optical, and wireless radio-frequency methods that may be arranged in a
variety of network topologies
TOPOLOGY
Topology defines the structure of the network of how all the components are interconnected to each
other. There are two types of topologies: Physical and Logical topology.
TOPOLOGY
PHYSICAL LOGICAL
TOPOLOGY TOPOLOGY
PHYSICAL TOPOLOGY
• Physical topology refers to the interconnected structure of a local area network (LAN). The
method employed to connect the physical devices on the network with the cables, and the
type of cabling used, all constitute the physical topology.
• Physical topology is the geometric representation of all the nodes in a network.
LOGICAL TOPOLOGY
1|Page
TYPES OF NETWORK TOPOLOGY (PHYSICAL TOPOLOGY)
NETWORK TOPOLOGY
BUS TOPOLOGY
• The bus topology is designed in such a way that all the stations are connected through a single
cable known as a backbone cable.
• Each node is either connected to the backbone cable by drop cable or directly connected to
the backbone cable.
• When a node wants to send a message over the network, it puts a message over the network.
All the stations available in the network will receive the message whether it has been
addressed or not.
• The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks.
• The configuration of a bus topology is quite simpler as compared to other topologies.
• The backbone cable is considered as a "single lane" through which the message is broadcast
to all the stations.
The most common access method (Protocol) of the bus topologies is CSMA (Carrier Sense Multiple
Access).
CSMA: It is a media access control used to control the data flow so that data integrity is maintained,
i.e., the packets do not get lost. There are two alternative ways of handling the problems that occur
when two nodes send the messages simultaneously.
CSMA CD: CSMA CD (Collision detection) is an access method used to detect the collision. Once the
collision is detected, the sender will stop transmitting the data. Therefore, it works on "recovery after
the collision".
2|Page
CSMA CA: CSMA CA (Collision Avoidance) is an access method used to avoid the collision by checking
whether the transmission media is busy or not. If busy, then the sender waits until the media becomes
idle. This technique effectively reduces the possibility of the collision. It does not work on "recovery
after the collision".
RING TOPOLOGY
• Ring topology is like a bus topology, but with connected ends.
• The node that receives the message from the previous computer will retransmit to the next
node.
• The data flows in one direction, i.e., it is unidirectional.
• The data flows in a single loop continuously known as an endless loop.
• It has no terminated ends, i.e., each node is connected to other node and having no
termination point.
• The data in a ring topology flow in a clockwise direction.
3|Page
The most common access method (Protocol) of the ring topology is token passing.
Token passing: It is a network access method in which token is passed from one node to another node.
• A token moves around the network, and it is passed from computer to computer until it
reaches the destination.
• The sender modifies the token by putting the address along with the data.
• The data is passed from one device to another device until the destination address matches.
Once the token received by the destination device, then it sends the acknowledgment to the
sender.
• In a ring topology, a token is used as a carrier.
• Network Management: Faulty devices can be removed from the network without bringing
the network down.
• Product availability: Many hardware and software tools for network operation and
monitoring are available.
• Cost: Twisted pair cabling is inexpensive and easily available. Therefore, the installation cost
is very low.
• Reliable: It is a more reliable network because the communication system is not dependent
on the single host computer.
4|Page
Disadvantages of Ring topology:
• Difficult troubleshooting: It requires specialized test equipment to determine the cable faults.
If any fault occurs in the cable, then it would disrupt the communication for all the nodes.
• Failure: The breakdown in one station leads to the failure of the overall network.
• Reconfiguration difficult: Adding new devices to the network would slow down the network.
• Delay: Communication delay is directly proportional to the number of nodes. Adding new
devices increases the communication delay.
STAR TOPOLOGY
In star topology, all the devices are connected to a single hub through a cable. This hub is the central
node and all other nodes are connected to the central node. The hub can be passive in nature i.e., not
an intelligent hub such as broadcasting devices, at the same time the hub can be intelligent known as
an active hub. Active hubs have repeaters in them.
Coaxial cables or RJ-45 cables are used to connect the computers. In Star Topology, many popular
Ethernet LAN protocols are used as CD (Collision Detection), CSMA (Carrier Sense Multiple Access),
etc.
In above image star topology having four systems connected to a single point of connection i.e. hub.
• If N devices are connected to each other in a star topology, then the number of cables required
to connect them is N. So, it is easy to set up.
• Each device requires only 1 port i.e. to connect to the hub, therefore the total number of ports
required is N.
• It is Robust. If one link fails only that link will affect and not other than that.
• Easy to fault identification and fault isolation.
• Star topology is cost-effective as it uses inexpensive coaxial cable.
5|Page
Problems with this topology:
• If the concentrator (hub) on which the whole topology relies fails, the whole system will crash
down.
• The cost of installation is high.
• Performance is based on the single concentrator i.e. hub.
MESS TOPOLOGY
• Mesh technology is an arrangement of the network in which computers are interconnected
with each other through various redundant connections.
• There are multiple paths from one computer to another computer.
• It does not contain the switch, hub or any central computer which acts as a central point of
communication.
• The protocols used are AHCP (Ad Hoc Configuration Protocols), DHCP (Dynamic Host
Configuration Protocol).
• The Internet is an example of the mesh topology.
• Mesh topology is mainly used for WAN implementations where communication failures are a
critical concern.
• Mesh topology is mainly used for wireless networks.
• Suppose, the N number of devices are connected with each other in a mesh topology, the
total number of ports that are required by each device is N-1. In Figure 1, there are 5 devices
connected to each other, hence the total number of ports required by each device is 4. The
total number of ports required=N*(N-1).
• Number of cables = (n*(n-1))/2; Where n is the number of nodes that represents the network.
6|Page
Mesh topology is divided into two categories:
MESH
TOPOLOGY
Full Mesh Topology: In a full mesh topology, each computer is connected to all the computers
available in the network.
Partial Mesh Topology: In a partial mesh topology, not all but certain computers are connected to
those computers with which they communicate frequently.
• Reliable: The mesh topology networks are very reliable as if any link breakdown will not affect
the communication between connected computers.
• Fast Communication: Communication is very fast between the nodes.
• Easier Reconfiguration: Adding new devices would not disrupt the communication between
other devices.
• Cost: A mesh topology contains a large number of connected devices such as a router and
more transmission media than other topologies.
• Management: Mesh topology networks are very large and very difficult to maintain and
manage. If the network is not monitored carefully, then the communication link failure goes
undetected.
• Efficiency: In this topology, redundant connections are high that reduces the efficiency of the
network.
TREE TOPOLOGY
• Tree topology combines the characteristics of bus topology and star topology.
• A tree topology is a type of structure in which all the computers are connected with each other
in hierarchical fashion.
• The top-most node in tree topology is known as a root node, and all other nodes are the
descendants of the root node.
• There is only one path exists between two nodes for the data transmission. Thus, it forms a
parent-child hierarchy.
• This topology has a hierarchical flow of data.
• In Tree Topology, protocols like DHCP and SAC (Standard Automatic Configuration) are used.
7|Page
Advantages of Tree topology
• Support for broadband transmission: Tree topology is mainly used to provide broadband
transmission, i.e., signals are sent over long distances without being attenuated.
• Easily expandable: We can add the new device to the existing network. Therefore, we can say
that tree topology is easily expandable.
• Easily manageable: In tree topology, the whole network is divided into segments known as
star networks which can be easily managed and maintained.
• Error detection: Error detection and error correction are very easy in a tree topology.
• Limited failure: The breakdown in one station does not affect the entire network.
• Point-to-point wiring: It has point-to-point wiring for individual segments.
• Difficult troubleshooting: If any fault occurs in the node, then it becomes difficult to
troubleshoot the problem.
• High cost: Devices required for broadband transmission are very costly.
• Failure: A tree topology mainly relies on main bus cable and failure in main bus cable will
damage the overall network.
• Reconfiguration difficult: If new devices are added, then it becomes difficult to reconfigure.
HYBRID TOPOLOGY
• The combination of various different topologies is known as Hybrid topology.
• A Hybrid topology is a connection between different links and nodes to transfer the data.
• When two or more different topologies are combined together is termed as Hybrid topology
and if similar topologies are connected with each other will not result in Hybrid topology. For
example, if there exist a ring topology in one branch of ICICI bank and bus topology in another
branch of ICICI bank, connecting these two topologies will result in Hybrid topology.
8|Page
Advantages of Hybrid Topology
• Reliable: If a fault occurs in any part of the network will not affect the functioning of the rest
of the network.
• Scalable: Size of the network can be easily expanded by adding new devices without affecting
the functionality of the existing network.
• Flexible: This topology is very flexible as it can be designed according to the requirements of
the organization.
• Effective: Hybrid topology is very effective as it can be designed in such a way that the strength
of the network is maximized and weakness of the network is minimized.
• Complex design: The major drawback of the Hybrid topology is the design of the Hybrid
network. It is very difficult to design the architecture of the Hybrid network.
• Costly Hub: The Hubs used in the Hybrid topology are very expensive as these hubs are
different from usual Hubs used in other topologies.
• Costly infrastructure: The infrastructure cost is very high as a hybrid network requires a lot of
cabling, network devices, etc.
9|Page
MCQ
1) The network topology is categorized into 6). Which topology uses a single cable which
____________ types? connects all the including nodes?
Answer: B Answer: B
2) Which one of the following topologies 7). Which topology combines two or more than
describes the way computers connect with the two topologies?
help of cables?
(A) Star
(A) Physical (B) Bus
(B) Logical (C) Ring
(C) Both a and b (D) Hybrid
(D) None of the above
Answer: D
Answer: B
8). Which one of the following topologies has a
3) How many types of physical topologies are root node?
there?
(A) Star
(A) Two (B) Tree
(B) Three (C) Ring
(C) Five (D) Hybrid
(D) Six
Answer: B
Answer: D
9). What are the advantages of hybrid
4) In which topology do all the computers topology?
connect with the help of a hub?
(A) Scalable
(A) Star (B) Flexible networking topology
(B) Bus (C) Highly efficient
(C) Ring (D) All of the above
(D) Mesh
Answer: D
Answer: A
10). What are the disadvantages of hybrid
5). In which topology the network consists topology?
direct link between two computers?
(A) Designing is complex
(A) Star (B) Costliest process
(B) Bus (C) Not expensive
(C) Ring (D) Both a and b
(D) P2P
Answer: D
Answer: D
10 | P a g e
11). Which one of the following topologies 16). The IP packets are packed into frames in
describes the way the data flow from one ______________ layer?
computer to another within a computer
(A) Datalink
network?
(B) Physical
(A) Physical (C) Both a and b
(B) Logical (D) None of the above
(C) Both a and b
Answer: B
(D) None of the above
17). Which layer transmits the frames into
Answer: A
transmission media?
12). What are the advantages of tree topology?
(A) Data link
(A) Easy to maintain (B) Physical
(B) Easy to manage (C) Network
(C) Node expansion is easy and fast (D) None of the above
(D) All of the above
Answer: B
Answer: D
18). In a bus topology, the computers connect
13). What are the drawbacks of mesh to a shared central cable called as ________
topology?
(A) Bus
(A) Installation is complex (B) Star
(B) Requires more space (C) Ring
(C) Expensive (D) None of the above
(D) All of the above
Answer: A
Answer: D
19). If a number of devices are four in mesh
14). The local area network has __________ topology network, then the number of lines or
main topologies? cables four devices have is _____________.
15). The data in the network layer is in the form 20). If a number of devices are four in mesh
of ______________ topology network, then the number of duplex
links in the mesh topology ____________
(A) IP packets
(B) Frames (A) Five
(C) Cables (B) Two
(D) None of the above (C) Twelve
(D) Six
Answer: A
Answer: D (n(n-1)/2)
11 | P a g e
21). If there are n devices in a mesh topology (B) Fifty
network then the total number of simplex links (C) Twelve
are __________________ (D) Forty-five
(A) Nine
12 | P a g e
30). The communication is always (A) 10 ports and 5 cables
_______________ in ring topology? (B) 20 ports and 5 cables
(C) 30 ports and 5 cables
(A) Unidirectional
(D) 50 ports and 5 cables
(B) Bidirectional
(C) Either unidirectional or bidirectional Answer: A
(D) None of the above
36). The slots in time-division multiplexing
Answer: A divided into _____________ types?
Answer: A
13 | P a g e
40). The number of nodes when extending 45). Which one of the following topologies is
network is limited in ________ topology? easier to troubleshoot?
Answer: D Answer: B
41). Any topology can be used as physical 46). The shielded twisted pair cable maximum
topology in _____________ length is around _____________
Answer: A Answer: D
Answer: A
14 | P a g e
50). In _____________ topology the 55). The token ring doesn’t use
computers connect to a central device, a hub _______________ topology?
or a switch with PLP communication links?
(A) Physical ring
(A) Star (B) Physical star
(B) Bus (C) Logical ring
(C) Hybrid (D) None of the above
(D) None of the above
Answer: A
Answer: A
56). If a number of devices are four in a mesh
51). How many computers can transmit data at topology network, then the number of lines or
a time in a bus topology? cables in each device is _____________
Answer: A Answer: C
52). What are the disadvantages of bus 57). What are the benefits of mesh topology?
topology?
(A) Robust
(A) Has limited computers (B) Has multiple lines
(B) Has little fault tolerance (C) Privacy and security
(C) Both a and b (D) All of the above
(D) None of the above
Answer: D
Answer: C
58). What are the drawbacks of a star
53). What are the advantages of bus topology? topology?
Answer: C Answer: D
15 | P a g e
60). What are the benefits of ring topology? 65). Which one of the following is not an
application layer protocol?
(A) Easy to reconfigure
(B) Easy to install (A) HTTP
(C) Faster error checking (B) SMTP
(D) All of the above (C) TCP
(D) None of the above
Answer: D
Answer: C
61). What are the benefits of P2P topology?
66). The network transmission techniques are
(A) Highly reliable
categorized into ______________ types?
(B) Faster
(C) Doesn't need expensive server (A) One
(D) All of the above (B) Two
(C) Three
Answer: D
(D) Four
62). Which one of the following is a central
Answer: C
device in star topology?
67). The packet switching is categorized into
(A) Hub
______________ types?
(B) Switch
(C) Both a and b (A) One
(D) None of the above (B) Two
(C) Three
Answer: C
(D) Four
63). The optical fiber cable maximum data
Answer: B
transfer rate is around __________
68). What is the standard form of HAN?
(A) 10Mbps
(B) 20Mbps (A) Home Area Network
(C) 10000Mbps (B) Huge Area Network
(D) 150Mbps (C) House Area Network
(D) None of the above
Answer: C
Answer: A
64). Which one of the following is an unguided
media? 69). What is the standard form of CAN?
Answer: C Answer: B
16 | P a g e
70). Which one of the following is an 75). The distance range of the Wide Area
application layer protocol? Network is around ___________
Answer: D Answer: B
71). The distance range of the Home Area 76). The distance range of the Global Area
Network is around ___________ Network is around ___________
Answer: C Answer: B
72). The distance range of the Local Area 77). What is the standard form of WAP?
Network is around ___________
(A) Wireless Access Protocol
(A) 1Km (B) WAN Access Protocol
(B) 2Km (C) Wide Access Protocol
(C) 0.1Km to 1Km (D) None of the above
(D) 5Km
Answer: A
Answer: C
78). What is the standard form of SSL?
73). The distance range of the Campus Area
(A) Switch Socket Layer
Network is around ___________
(B) Secure Socket Layer
(A) 1Km (C) Simple Socket Layer
(B) 2Km (D) None of the above
(C) 0.1Km to 1Km
Answer: B
(D) 1 to 10Km
79). What is the standard form of SMTP?
Answer: D
(A) Switch Mail Transfer Protocol
74). The distance range of the Metropolitan
(B) Simple Mail Transfer Protocol
Area Network is around ___________
(C) Secure Mail Transfer Protocol
(A) 10 to 100Km (D) None of the above
(B) 2Km
Answer: B
(C) 0.1Km to 1Km
(D) 1 to 10Km
Answer: A
17 | P a g e
80). What is the standard form of POP? (D) None of the above
18 | P a g e
91). What is the standard form of GAN?
Answer: A
Answer: A
(A) CSMA/CD
(B) Token bus
(C) Token ring
(D) None of the above
Answer: A
Answer: C
19 | P a g e