The bus topology is designed in such a way that all the stations are connected through a Each node is either connected to the single cable known as a backbone cable.
Backbone cable by drop cable or directly connected to the backbone cable.
When a node wants to send a message over the network, it puts a message over the network.
All the stations available in the network will receive the message whether it has been addressed or not.
The bus topology is mainly used in 802.3 (Ethernet) and 802.4 standard networks.
The configuration of a bus topology is quite simpler as compared to other topologies.
The backbone cable is considered as a "single lane" through which the message is broadcast to all the stations.
Advantages:
Disadvantages:
In this topology, it forms a ring connecting devices with its exactly two neighbouring devices.
A number of repeaters are used for Ring topology with a large number of nodes, because if someone wants to send some data to the last node in the ring topology with 100 nodes, then the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss repeaters are used in the network
The transmission is unidirectional, but it can be made bidirectional by having 2 connections between each Network Node, it is called Dual Ring Topology
Advantages:
Disadvantages:
In star topology, all the devices are connected to a single hub through a cable. This hub is the central node and all other nodes are connected to the central node. The hub can be passive in nature i.e., not an intelligent hub such as broadcasting devices, at the same time the hub can be intelligent known as an active hub. Active hubs have repeaters in them.
A star topology having four systems connected to a single point of connection i.e. hub.
Advantages:
Disadvantages:
A tree topology is a type of structure in which all the computers are connected with each other in hierarchical fashion.
Tree topology combines the characteristics of bus topology and star topology.
The top-most node in tree topology is known as a root node, and all other nodes are the descendants of the root node.
There is only one path exists between two nodes for the data transmission. Thus, it forms a parent-child hierarchy.
Advantages:
Disadvantages:
There are multiple paths from one computer to another computer.
It does not contain the switch, hub or any central computer which acts as a central point of communication.
The Internet is an example of the mesh topology.
Mesh topology is mainly used for WAN implementations where communication failures are a critical concern.
Mesh topology is mainly used for wireless networks.
Mesh topology can be formed by using the formula:
Number of cables = (n*(n-1))/2
Advantages:
Disadvantages:
The combination of various different topologies is known as Hybrid topology.
A Hybrid topology is a connection between different links and nodes to transfer the data.
When two or more different topologies are combined together is termed as Hybrid topology and if similar topologies are connected with each other will not result in Hybrid topology.
For example, if there exist a ring topology in one branch of ICICI bank and bus topology in another branch of ICICI bank, connecting these two topologies will result in Hybrid topology.
Advantages:
Disadvantages:
OSI | TCP/IP |
---|---|
It has 7 layers | It has 4 layers |
OSI provides layer functioning and also defines functions of all the layers. | TCP/IP model is more based on protocols and protocols are not flexible with other layers. |
In the OSI model, the transport layer guarantees the delivery of packets | In the TCP/IP model, the transport layer does not guarantee delivery of packets. |
Follows horizontal approach | Follows a vertical approach. |
OSI model has a separate presentation layer | TCP/IP doesn’t have a separate presentation layer |
OSI is a general model. | TCP/IP model cannot be used in any other application. |
The network layer of the OSI model provides both connection-oriented and connectionless service. | The Network layer in the TCP/IP model provides connectionless service. |
OSI model has a problem of fitting the protocols in the model | TCP/IP model does not fit any protocol |
Protocols are hidden in the OSI model and are easily replaced as the technology changes. | In TCP/IP replacing protocol is not easy. |
OSI model defines services, interfaces, and protocols very clearly and makes a clear distinction between them. | In TCP/IP, it is not clearly separated its services, interfaces, and protocols |
Network devices are physical devices that allow hardware on a computer network to communicate and interact with each other.
Network devices like hubs, repeaters, bridges, switches, routers, gateways, and router help manage and direct data flow in a network.
They ensure efficient communication between connected devices by controlling data transfer, boosting signals, and linking different networks.
Each device serves a specific role, from simple data forwarding to complex routing between networks.
Network devices work as a mediator between two devices for transmission of data, and thus play a very important role in the functioning of a computer network.
Functions of Network Devices
Common Types of Networking Devices:
A protocol is a set of rules that determines how data is transmitted and received over a network. It ensures smooth communication between sender and receiver
Key elements of a protocol:
Types of Protocols:
Type | Example | Function |
---|---|---|
Network Layer | IP, ICMP | Routing and addressing |
Transport Layer | TCP, UDP | End-to-end delivery |
Application Layer | HTTPS, FTP, SMTP | App-to-app communication |
Wireless | Wi-Fi, Bluetooth, LTE | Wireless data transfer |
Routing | RIP, OSPF, BGP | Path selection for data |
Security | SSL, TLS | Secure communication |
Internet Protocols | IPv4, IPv6 | Unique device addressing |
Important Protocols:
Protocols in Cyber Attacks:
A standard is a set of accepted rules for designing systems and ensuring compatibility between devices.
Types of Standards:
Importance of Protocols and Standards in Security:
Best Practices for Compliance:
Protocols and standards are essential for reliable, secure, and efficient communication in computer networks. Following them ensures compatibility, performance, and protection from cyber threats.
Made By SOU Student for SOU Students