Time
41 minutes
Difficulty
Intermediate
CEU/CPE
1

Video Transcription

00:00
Hello, My name is Dustin and welcome to networking.
00:04
Networked apologies
00:06
number topology, Zahra diagram or lay o of the connections between computers. They're usually named based on the shape of them. For example, of ring topology Looks like a ring.
00:17
Every topology has both advantages and disadvantages, so it's important to understand the different options you may have available.
00:26
The first apology we're going to go over is a ring network.
00:30
Any ring network. All computers or devices are connected to a closed loop cable, so there are no terminating ends. If one system crashes, the whole network goes down
00:41
in a ring network. Each computer acts as a repeater for the signal.
00:45
Devices have to wait for a token to come by to send data. That's why they're typically known. Referred to as token ring networks,
00:54
the token helps carry the data along the ring. Once the data reaches its destination, the token a stripped of the data and continues along the ring without any data waiting for another device to attach data to it.
01:10
The next topology we're going to go over is a bus network
01:14
devices on a bus network also referred to as nodes.
01:19
These nodes are all connected to a single linear cable known as a trunk.
01:23
Each end of the trunk must be terminated to prevent the signal from rebounding back through the cable.
01:32
The next type of network we're going to go over is a mesh network.
01:36
Mesh networks can be figured in a couple of different ways, either a full mesh or a partial mesh
01:42
in a full mesh network. Every device is connected to every other device on the network.
01:49
Because of the amount of connections in a foam ash network, these could be very expensive to implement. But they do have extremely high redundancy because there are so many different routes and multiple links could go down without a failure of the network.
02:04
These air, typically used for backbone traffic
02:08
in a partial MASH network. You get many benefits of the mesh network without the higher cost. In this topology, several devices are connected in a full mesh, while other devices are not. It's usually a lot less expensive and offers not as much redundancy as a full mesh network, but quite a bit.
02:30
The next topology we're going to go over is a star network
02:36
star networks or what the most common types of Ethernet networks in a star network. All devices are connected to a central hub or a switch
02:45
these air typically very easy to implement and have a decent amount of redundancy.

Up Next

Networking Fundamentals for Security Practitioners

In this course, you will learn the fundamentals of networking through the lens of a security practitioner. More specifically, we will cover topics like network protocols, architecture, devices, and topology, which are vital for any entry level IT/Security professional.

Instructed By

Instructor Profile Image
Dustin Parry
Network Security Engineer
Instructor