Network Topologies
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:01
Hey, guys, Welcome to another episode of the S S C P exam print.
00:06
I'm your host, Peter Simple in This is going to be the third lesson in the six domain
00:11
so far. In the sixth of mean, we've taken a look at the O. S. I and T c p i p. Miles. We've taken a look how it requires seven different layers to send data for one part of the network to the other. We've also taken a look at ikey networking, which is an in depth dive on how information is actually sent
00:31
over the network.
00:32
And now finally, in this lesson, we're going to look at networked apologies several of them, in fact. And each one has its own advantages and disadvantages. Depending on the needs of the organization. Let's get started.
00:47
They're deaf. Many different networked apologies that one can use when setting up a network. It's good for the s S e P practitioner to understand that and be familiar with them to know which one might be best for a particular network.
01:02
So the 1st 1 is known as the bust apology.
01:06
This is simply a local area network with a central cable known is a bus to which all the notes connect. Now just one cable data passes back and forth on this main cable
01:19
and all the news, the different computers. They just attach themselves to this main cable and listen for traffic that is destined for them if it best in for them when they pull it in. And then they read it and goes from there. That's how they send information back and forth.
01:36
Advantages of this are adding news. Subaru. He's just
01:40
plug it in and you're good to go. And one node failure doesn't bring down the whole network.
01:46
Now down Thought And this is everything is dependent on the bus. So if this central cable goes, then head of the network,
01:56
it's a trip. All the voices connect to a branching cable,
02:00
so there are several different on hubs or switches involved here, and information travels from one cable to another.
02:14
Another advantage is adding news, not a problem. And if one *** fails, then that doesn't really affect the rest of the network.
02:23
One of the bigger problems is a cable failure similar to the bus, but it's not as bad. The cable failure and a tree wouldn't be as bad as in the bus. If the cable fails for one of these in this in this apology,
02:40
then yes, a certain amount of news would go down and be disabled, but not all of them.
02:46
Whereas with the boss, all the news would be disabled.
02:50
Bringing topology This is a loop, and data is only transmitted in one direction. This is a rain topology data is only transmitted in one direction so that they have each computer attached to this topology can on Lee send direction.
03:09
I could only send information
03:12
one way
03:13
and can only receive information from its downstream neighbors.
03:19
Now the vengeance and this is you can know exactly the amount of weight time of it take to get information to be passed from one spot to the other, and the network can be used as a backbone or a land
03:36
problem with. This is because they're all connected in a ring. If one computer fails, then that breaks the entire ring, and all of the computers would then be disabled.
03:49
MASH network. All nodes were connected to every single other ***
03:53
advantages of this. There's a high level of redundancy. So even if cable goes down or something happens to one of the computers that are attached to this topology than the rest of the computers will still work that can still send information back and forth to each other. This advantage of this
04:14
it's very expensive. Delay all these cables
04:16
in order to have all of them connect to one another can be very expensive expect, especially when there are many computers attached to this kind of network.
04:27
This is the start apology where all of the all the computers or news are connected to one central device, which is usually a hub or a switch or router.
04:39
Plenty of advantages. With this, there are only a few cables on Lee won one cable needed poor per ***, and they're easy to deploy. You just simply hooking new one and you're good to go. Nodes can also easily be added or removed.
04:57
The problem with this is that it's a single point of failure. Something happens to the hub or the switch, then the whole network is inoperable.
05:04
Most communication networks, especially when initiated by a user, is usually from one host to another. So when a person wants to get information they need to request information, they receive it or they send in formation.
05:19
Now a single transmission with one receiving host is called a Unit Cast Transition. This is where you can send a packet only to one person.
05:31
Now there's also a multicast where you can send it to select people. Or there's a broadcast where you can send into every single person in the network.
05:44
Circuits switched networks. This is a dedicated circuit between imports. This circuit is known as always available. It's always dedicated. The two machines they're talking that used this circuit always have this circuit open for them to communicate data.
06:02
Example of this is telephone lines.
06:05
The other one of this is packet switch networks,
06:10
where they do not use a dedicated connection between two endpoints, but instead they send information on a shared network.
06:19
These are for these packets. They are sent from one spot to the other, using what is known as the best path or the quickest way to get to one spot to the other.
06:32
All the packets obviously need to be in the correct order, so if they aren't, then you have to wait for the packets to come in because not every packet takes the same path. If one pack it's going one way and there is from the network congestion or
06:50
it would all Sunday at the time would take to get there is longer.
06:54
Packet might be rerouted through a different way on the network
07:00
virtual circuits.
07:01
These are circuits usually used in like virtual lands. On these provide a connection between endpoints. The accident was like a physical circuit for these air circuits that you can send information back and forth, but they
07:16
they kind of don't they kind of don't exist.
07:19
There's no riel dedicated physical circuit. It's simply a virtual one. Now there's two different kinds of virtual circuits.
07:29
This is a permanent virtual circuit where the carrier configured. There's the circus roots and the switched virtual circuit, which is configured dynamically violent routers in the network
07:43
carrier since multiple access. This is a protocol which uses the absence. Print your presence off a signal on a wire as permission to speak.
07:54
So in order to make sure that the packets don't hit each other, they need. There's no need to be a way to let a computer know when to send a packet on a wire. So that's this is where carrier sense multiple access comes in. If it doesn't detect that there's
08:13
any type of
08:15
action on the wire, might sense of information, or if it detects that there is,
08:20
uh, information on the wire, then it won't send anything. Now there's two variations of this. The 1st 1 is collision of wings.
08:28
This requires devices to announce transmitting by using a jamming signal. So when they are one of the computer is about to send information or packet over the network. They send out an alert saying, Hey, don't anybody said anything? I'm about to send something.
08:48
The other one is collision detection. This listens for packets on the wire before transmitting data. If they don't hear anything than they safely assume that they can use the wire to send information
09:03
token passing on Lee. One device may transmit at a time, and devices can only transmit if they have. If they possess the token. Now, this is basically a substitution for a lack of carrier sense off accessing. So instead of listening,
09:22
everybody knows if you have the token, you could transmit data.
09:26
If you don't. Then you cannot send anything on. And then the token goons back and forth to the different *** in the network.
09:35
Even that course played a major role in the lands. Sense of his first developed in the 19 eighties. Um well, can this a little bit more later? But this is usually have networks are put together through money from that court.
09:48
And you have the token ring.
09:50
Well, we looked a little bit. This is very similar to the rink topology, where each device gets its data from its neighbor in one direction and can only pass it to the next station that's on the wire.
10:03
Now suppose that, um, station A, in this example wants to send something to station. See?
10:11
Well, they wait until they have the token ring on. Then they send the information and the only direction they can, which would be either station your station D. Let's say they can only send a station d, so they send the station. D
10:26
Station D now has the token on the information, and they realize it's not for them. So they sent it to station. See Feitian see realizes it's for them on dhe Then they received the information and send the token to go to the next spot.
10:46
Fiber distributed data interface f d D I. This is another one of those token passing architecture, but this uses to bring this uses information that flows in opposite directions.
11:01
So this isn't This is a way to provide a redundancy in case one off the workstations goes down.
11:09
So let's say, for example, that the
11:13
um information is passing in a clockwise and counterclockwise motion. And then the work station on the very bottom decided to become inoperable, so it's no longer available. Instead of the whole network being disabled, the two rings can can continue to send information back and forth
11:33
through the other three
11:35
because the two information flows go in opposite directions.
11:41
Multi protocol label switching. This offers mechanisms for Pak Tik traffic
11:46
and multi service functionality. So in normal, rounding a packet is sent to a router and then from there, the routing table router looks up the next step in the destination on its routing table and sends the packet to the next round.
12:05
Well with multi protocol label switching
12:09
when the packet first is received by the first rounder. The first Ratter calculates the entire destination to that the packet needs to take, and then it simply applies a label to that pack it and sends it on its way when it gets to the next round. Er
12:24
that Ratter does not have to look up the next destination in the round table,
12:30
but rather it just looked at the label,
12:31
sees where it's supposed to go and then just sends it on its way. This is really, really great. Thio provide relief for network congestion, and it uses less. Resource is
12:46
in today's lecture. We discussed networked apologies and concepts.
12:52
Quiz time.
12:54
What network topology consists of all nodes being connected to one central device.
12:58
Is it a mesh be star
13:03
C bus or D tree?
13:09
If you said be star than you are correct, remember, the device in the centre is usually a switch or hub, and all the other voices are attached to it.
13:22
Thanks for watching guys. I hope you learned a lot in this video, and I'll see you next time
Up Next
Similar Content