Presentation Aict

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 28

Network

Topologies and
Computer
Security
Introduction
 Overview
 Network Types
 Network Topologies
 Computer Security
 Importance of securing networks
What is a Network
 A network is a system or group of more computers or other
electronic devices that are interconnected for the purpose of
exchanging data and sharing resources.
 The purpose of networking is communication and resource
sharing.
Physical representation Theoretical
Behavior
Types of Network
 Local Area Network (LAN): Small area, e.g Home, Office

 Wide Area Network (WAN): Covers large geographical areas, e.g The
Internet.

 Metropolitan Area Network (MAN): City-wide coverage.

 Personal Area Network (PAN): Small scale, personal use (e.g.


Bluetooth)

 Virtual Private Network (VPN): Secure, private network over the


internet
Network Topologies Overview

 What is Network topology?


 Is used to describe the:
 Physical Topology (arrangement of actual hardware) and logical Topology (how data
flows) structure of a network

 Types of Network Topologies:


Bus
 Description: Single central cable with all devices
Topology
connected to it.
 Pros: Easy to install, cost-effective.
 Cons: If the main cable fails, the entire network goes
down.
 A common example of bus topology is the Ethernet
LAN, where all devices are connected to a single
coaxial cable or twisted pair cable.
 This topology is also used in cable television
networks.
Advantages of Bus Topology

 If N devices are connected to each other in a bus topology, then the


number of cables required to connect them is 1, known as
backbone cable, and N drop lines are required.
 Coaxial or twisted pair cables are mainly used in bus-based
networks that support up to 10 Mbps.
 The cost of the cable is less compared to other topologies, but it is
used to build small networks.
 Bus topology is familiar technology as installation and
troubleshooting techniques are well known.
 CSMA is the most common method for this type of topology.
Disadvantages of Bus
Topology
 A bus topology is quite simpler, but still, it requires a lot of
cabling.
 If the common cable fails, then the whole system will crash down.
 If the network traffic is heavy, it increases collisions in the
network.
 Adding new devices to the network would slow down networks.
 Security is very low.
Star

Topology
Description:
switch.
Devices are connected to a central hub or

 Pros: If one cable fails, other devices remain


unaffected.
 Cons: If the central hub fails, the whole network is
affected.
 In Star Topology, all the devices are connected to a
single hub through a cable.
 This hub is the central node and all other nodes are
connected to the central node.
 The hub can be passive in nature i.e., not an
intelligent hub such as broadcasting devices, at the
same time the hub can be intelligent known as an
active hub.
 Active hubs have repeaters in them.
 Coaxial cables or RJ-45 cables are used to connect the
computers.
 In Star Topology, many popular Ethernet LAN
protocols are used
Advantages of Star Topology

 If N devices are connected to each other in a star topology, then


the number of cables required to connect them is N. So, it is easy
to set up.
 Each device requires only 1 port i.e. to connect to the hub,
therefore the total number of ports required is N.
 It is Robust. If one link fails only that link will affect and not other
than that.
 Easy to fault identification and fault isolation.
 Star topology is cost-effective as it uses inexpensive coaxial
cable.
Disadvantages of Star
Topology
 If the concentrator (hub) on which the whole topology relies fails,
the whole system will crash down.
 The cost of installation is high.
 Performance is based on the single concentrator i.e. hub.
 A common example of star topology is a local area network (LAN)
in an office where all computers are connected to a central hub.
 This topology is also used in wireless networks where all devices
are connected to a wireless access point.
Ring Topology
 Devices are connected in a circular manner.
 Each device has two neighbors for communication.
 If a single connection breaks, the entire network is
disrupted.
 A number of repeaters are used for Ring topology with a
large number of nodes, because if someone wants to send
some data to the last node in the ring topology with 100
nodes, then the data will have to pass through 99 nodes
to reach the 100th node.
 Hence to prevent data loss, repeaters are used in the
network.
 The data flows in one direction, i.e. it is unidirectional, but
it can be made bidirectional by having 2 connections
between each Network Node,
 it is called Dual Ring Topology.
 In-Ring Topology, the Token Ring Passing protocol is used
by the workstations to transmit the data.
Advantages of Ring Topology

 The data transmission is high-speed.


 The possibility of collision is minimum in this type of topology.
 Cheap to install and expand.
 It is less costly than a star topology.
Disadvantages of Ring
Topology
 The failure of a single node in the network can cause the entire
network to fail.
 Troubleshooting is difficult in this topology.
 The addition of stations in between or the removal of stations can
disturb the whole topology.
 Less secure.
Mesh Topology
 In a mesh topology, every device is connected
to another device via a particular channel.
 Description: Combination of different
topologies (e.g., star-bus, star-ring).
 Flexible, scalable.
 Complex to design and manage.
Advantages of Mesh Topology

 Communication is very fast between the nodes.


 Mesh Topology is strong.
 The fault is diagnosed easily.
 Data is reliable because data is transferred among the devices
through dedicated channels or links.
 Provides security and privacy.
Disadvantages of Mesh
Topology
 Installation and configuration are difficult.
 The cost of cables is high as bulk wiring is required, hence
suitable for less number of devices.
 The cost of maintenance is high.
 A common example of mesh topology is the internet backbone,
where various internet service providers are connected to each
other via dedicated channels.
 This topology is also used in military communication systems and
aircraft navigation systems
Hybrid Topology
 This topological technology is the combination of
all the various types of topologies we have studied
above.
 Hybrid Topology is used when the nodes are free
to take any form.
 It means these can be individuals such as Ring or
Star topology or can be a combination of various
types of topologies seen above.
 It is a Combination of different topologies (e.g.,
Star-Bus, Star-Ring).
 Flexible, scalable.
 Complex to design and manage.
Advantages of Hybrid
Topology
 This topology is very flexible .
 The size of the network can be easily expanded by adding new
devices.
Disadvantages of Hybrid
Topology
 It is challenging to design the architecture of the Hybrid
Network.
 Hubs used in this topology are very expensive.
 The infrastructure cost is very high as a hybrid network requires
a lot of cabling and network devices .
What is Computer Security?

 Definition: Protecting systems, networks, and data from cyber


attacks.
 Why it matters: Protects sensitive information, prevents financial
losses, etc.
Key Components of Computer
Security
 Confidentiality: Ensuring that sensitive data is only accessible to
authorized users.
 Integrity: Protecting data from being altered or tampered with.
 Availability: Ensuring systems and data are available when
needed.
Common Security Threats

 Malware: Viruses, worms, ransomware.


 Phishing: Fraudulent attempts to obtain sensitive information.
 Denial-of-Service (DoS): Overwhelming systems to make them
unavailable.
 Man-in-the-Middle Attacks: Intercepting communications between
two parties.
Security Measures
 Firewalls: Monitor and control incoming and outgoing network
traffic.
 Antivirus Software: Detect and remove malicious software.
 Encryption: Encoding data to prevent unauthorized access.
 Two-factor Authentication (2FA): Adds an extra layer of security
beyond just passwords.
Importance of Network
Security
 Prevent unauthorized access to sensitive data.
 Ensure system uptime and prevent costly downtime.
 Maintain user trust by securing personal and financial data.
Best Practices for Network
Security
 Strong password policies.
 Regular software updates and patch management.
 Employee training on recognizing phishing and social engineering
attacks.
 Network segmentation to limit access.
Conclusion

 In conclusion, network topologies play a crucial role in determining


the efficiency and reliability of a computer network.
 Each topology, whether it’s bus, star, ring, mesh, or tree, offers
unique benefits and potential drawbacks.
 By understanding these different arrangements, network designers
can choose the most appropriate topology to meet the specific needs
of their systems, ensuring optimal performance and connectivity.
 Network security should be practiced at all times to ensure protection
of sensitive data and to maintain high level user trust by securing
personal and financial data
Questions
What is the main benefit of tree topology?
Tree topology combines characteristics of star and bus topologies. It supports
future expandability of the network and provides efficient data management

Which topology is best for large networks?


For large networks, mesh and tree topologies are often preferred. Mesh topology
offers high reliability and redundancy, while tree topology supports scalability
and efficient data organization.

Can different topologies be combined in a single network?


Yes, different topologies can be combined in a hybrid topology to take
advantage of the strengths of each type, improving overall network
performance and reliability.

How do I choose the right network topology for my needs?


Choosing the right network topology depends on factors such as the size of your
network, budget, desired performance, and the need for reliability and
scalability. Assess your specific requirements to make an informed decision.

You might also like