0% found this document useful (0 votes)
10 views

Data Communication Computer Network Imp Part 1

The document outlines key concepts in data communication and computer networks, including types of network topologies, error types, network devices, and definitions of protocols and bandwidth. It also discusses communication modes, Bluetooth architecture, and mobile generations from 1G to 4G, detailing their features and advancements. Additionally, it includes diagrams and examples to illustrate concepts like twisted pair cables and line of sight transmission.

Uploaded by

omkelkar2
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Data Communication Computer Network Imp Part 1

The document outlines key concepts in data communication and computer networks, including types of network topologies, error types, network devices, and definitions of protocols and bandwidth. It also discusses communication modes, Bluetooth architecture, and mobile generations from 1G to 4G, detailing their features and advancements. Additionally, it includes diagrams and examples to illustrate concepts like twisted pair cables and line of sight transmission.

Uploaded by

omkelkar2
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

DATA COMMUNICATION & COMPUETR NETWORKS

( 22414 ) IMP QUESTION


1. State different types of Network topologies. { 2 marks }
Ans:
o Mesh Topology
o Star Topology
o Bus Topology
o Ring Topology
o Hybrid Topology

2. State types of errors.{ 2 marks }


Ans:
o Single-Bit Error: The term single-bit error means that only 1 bit of a given
data unit (such as a byte, character, or packet) is changed from 1 to 0 or from
0 to 1.

o Burst Error: The term burst error means that 2 or more bits in the data unit
have changed from 1 to 0 or from 0 to 1.

3. List Any four network connecting devices? {2 marks }


Ans:
o Bridges
o Two-Layer Switches
o Routers
o Modem
o Three-Layer Switches
o Gateway

1
4. Draw a neat labeled diagram of co-axial cable. { 2 marks }
Ans:

5. Define computer Network. {2 marks }


Ans:
o A computer network is a system that connects various independent computers
in order to share information (data) and resources.
OR
o A computer network is a collection of two or more computer systems that are
linked together. A network connection can be established using either cable or
wireless media.
OR
o A computer network is defined as a system that connects two or more
computing devices for transmitting and sharing information.

6. List types of multiplexing. {2 marks }


Ans:
Following are the types of multiplexing:
o Frequency-Division Multiplexing
o Wavelength-Division Multiplexing
o Time-Division Multiplexing
a) Synchronous Time-Division Multiplexing
b) Asynchronous Time-Division Multiplexin
2
7. Define bit rate and Baund rate {2 marks }

Ans:
o Bit rate:
Bit rate is defined as the transmission of a number of bits per second. Bit Rate
cannot determine the bandwidth.

o Baud rate:
Baud rate is defined as the number of signal units per second. Baud rate can
determine the amount of bandwidth necessary to send the signal.

8. List classes of IP addresses. {2 marks }

Ans: Class A, Class B, Class C, class D and Class E

9. Define following terms: - {2 marks }


(i) Protocol
(ii) Bandwidth

Ans:

i. Protocol:
A protocol is a set of rules that govern data communications. It represents an
agreement between the communicating devices. Without a protocol, two
devices may be connected but not communicating, just as a person speaking
French cannot be understood by a person who speaks only Japanese.

ii. Bandwidth:
The bandwidth of a composite signal is the difference between the highest and
the lowest frequencies contained in that signal. For example, if a composite
signal contains frequencies between 1000 and 5000, its bandwidth is 5000
- 1000, or 4000.

10. Describe modes of communication {4 marks}

Ans:
o The way in which data is transmitted from one device to another device is
known as transmission mode.

3
o The transmission mode is also known as the communication mode. The
Transmission mode is divided into three categories

o Simplex mode
o Half-duplex mode
o Full-duplex mode Simplex mode

Simplex mode:
o In Simplex mode, the communication is unidirectional, i.e., the data flow in
one direction.

o A device can only send the data but cannot receive it or it can receive the data
but cannot send the data.

o This transmission mode is not very popular as mainly communications require


the two-way exchange of data. The simplex mode is used in the business field
as in sales that do not require any corresponding reply.

o The radio station is a simplex channel as it transmits the signal to the listeners
but never allows them to transmit back.

o Keyboard and Monitor are the examples of the simplex mode as a keyboard
can only accept the data from the user and monitor can only be used to display
the data on the screen.

Fig. Simplex mode

4
Half Duplex Mode:
o In a Half-duplex channel, direction can be reversed, i.e., the station can
transmit and receive the data as well. o Messages flow in both the directions,
but not at the same time.

o The entire bandwidth of the communication channel is utilized in one


direction at a time.

o In half-duplex mode, it is possible to perform the error detection, and if any


error occurs, then the receiver requests the sender to retransmit the data.

o A Walkie-talkie is an example of the Half-duplex mode. In Walkie-talkie, one


party speaks, and another party listens. After a pause, the other speaks and
first party listens. Speaking simultaneously will create the distorted sound
which cannot be understood.

Fig. Half Duplex mode

Full Duplex Mode:


o In Full duplex mode, the communication is bi-directional, i.e., the data flow
in both the directions.

o Both the stations can send and receive the message simultaneously.

o Full-duplex mode has two simplex channels. One channel has traffic moving
in one direction, and another channel has traffic flowing in the opposite
direction.

o The Full-duplex mode is the fastest mode of communication between devices.

5
o The most common example of the full-duplex mode is a telephone network.
When two people are communicating with each other by a telephone line, both
can talk and listen at the same time.

Fig. Full Duplex mode

11. Explain 802.11 Architecture. {4 marks }

Ans:
o IEEE 802.11
IEEE has defined the specifications for a wireless LAN, called IEEE 802.11,
which covers the physical and data link layers

o Architecture:
The standard defines two kinds of services: the basic service set (BSS) and
the extended service set (ESS).

o Basic Service Set


IEEE 802.11 defines the basic service set (BSS) as the building block of a
wireless LAN.

A basic service set is made of stationary or mobile wireless stations and an optional
central base station, known as the access point (AP).
Figure shows two sets in this standard. The BSS without an AP is a stand-alone
network and cannot send data to other BSSs. It is called an ad hoc architecture.

In this architecture, stations can form a network without the need of an AP; they can
locate one another and agree to be part of a BSS. A BSS with an AP is sometimes
referred to as an infrastructure network.

6
Fig Basic Service Set (BSS)

o Extended Service Set


An extended service set (ESS) is made up of two or more BSSs with APs. In
this case, the BSSs are connected through a distribution system, which is
usually a wired LAN. The distribution system connects the APs in the BSSs.
IEEE 802.11 does not restrict the distribution system; it can be any IEEE LAN
such as an Ethernet. Note that the extended service set uses two types of
stations: mobile and stationary. The mobile stations are normal stations inside
a BSS. The stationary stations are AP stations that are part of a wired LAN.
Figure shows an ESS.

Fig. Extended Service Set

7
When BSSs are connected, the stations within reach of one another can
communicate without the use of an AP. However, communication between
two stations in two different BSSs usually occurs via two APs. The idea is
similar to communication in a cellular network if we consider each BSS to be
a cell and each AP to be a base station. Note that a mobile station can belong
to more than one BSS at the same time.

12.Explain bluetooth Architecture.{ 4marks }


Ans:
Bluetooth technology is the implementation of a protocol defined by the IEEE
802.15 standard.

o Architecture
Bluetooth defines two types of networks: piconet and scatternet.

o Piconets:
A Bluetooth network is called a piconet, or a small net. A piconet can have up
to eight stations, one of which is called the primary;t the rest are called
secondaries. All the secondary stations synchronize their clocks and hopping
sequence with the primary. Note that a piconet can have only one primary
station. The communication between the primary and the secondary can be
one-to-one or one-to-many. Figure shows a piconet.

8
13. Draw a neat diagram of twisted pair cable and state its types.{ 4 marks }

Ans:

Types of Twisted–Pair Cables


There are two types of twisted pair cables –

A) Unshielded Twisted Pair (UTP): These generally comprise of wires and


insulators.

B) Unshielded twisted pair cables are classified into seven categories −


o Category 1 − UTP used in telephone lines with data rate < 0.1 Mbps

o Category 2 − UTP used in transmission lines with a data rate of 2 Mbps

o Category 3 − UTP used in LANs with a data rate of 10 Mbps

o Category 4 − UTP used in Token Ring networks with a data rate of 20


Mbps

o Category 5 − UTP used in LANs with a data rate of 100 Mbps

o Category 6 − UTP used in LANs with a data rate of 200 Mbps

o Category 7 − STP used in LANs with a data rate of 10 Mbps

Shielded Twisted Pair ( STP ): STP cable has a metal foil or braided mesh covering
that encases each pair of insulated conductors.

9
14. Describe the components of data communication with neat diagram.
{ 4 marks}
Ans :

o Message - It is the information to be communicated. Popular forms of


information include text, pictures, audio, video etc. Text is converted to
binary, number doesn’t converted, image is converted to pixels, etc.

o Sender - It is the device which sends the data messages. It can be a computer,
workstation, telephone handset etc.

o Receiver - It is the device which receives the data messages. It can be a


computer, workstation, telephone handset etc.

o Transmission Medium - It is the physical path by which a message travels


from sender to receiver. Some examples include twisted-pair wire, coaxial
cable, radio waves etc

o Protocol - It is a set of rules that governs the data communications. It


represents an agreement between the communicating devices. Without a
protocol, two devices may be connected but not communicating.

10
15. Explain LRC with example. { 4marks }

Ans:
Longitudinal redundancy check
o Longitudinal Redundancy Check (LRC) is the error detection method which
is used by upper layers to detect error in data.

o The other name for LRC is 2-D parity check. In this method, data which the
users want to send is organized into tables of rows and columns.

o To detect an error, a redundant bit is added to the whole block after addition
this block is transmitted to receiver side.

o This redundant bit is used by receiver to detect error. If there is no error,


receiver accepts the data and discards the redundant row of bits.

Example
If a block of 32 bits is to be transmitted, it is divided into matrix of four rows and
eight columns which as shown in the following figure:

,/
11
16. Describe line of sight transmission. { 4 marks }

Ans:
Line of sight communication
• Line of sight (LoS) is a type of communication that can transmit and receive
data only where transmit and receive stations are in view of each other
without any sort of an obstacle between them.
• Transmitting and receiving media should be in line of sight.
• In line of sight communication, very high frequency signals are transmitted
in straight lines directly from antenna to antenna.
• Antenna must be directional, facing each other, and either tall enough
or close enough together not to be effected by the curvature of earth.
• Above 30 MHz, neither ground wave nor sky wave propagation modes
operate, and communication must be by line of sight
• For satellite communication, a signal above 30 MHz is not reflected
by the
ionosphere and therefore a signal can be transmitted between an earth station and
a satellite overhead that is not beyond the horizon. For ground-based
communication,

the transmitting and receiving antennas must be within an effective line of sight
of each other.

This is better understood with the help of the following diagram:

12
17. Describe various mobile generations in detail. {4 marks}

Ans:
1G – First generation

1G refers to the first generation of wireless mobile communication where


analog signals were used to transmit data. It was introduced in the US in early
1980s and designed exclusively for voice communication.

Features:


Speeds up to 2.4 kbps
• Poor voice quality

• Large phones with limited battery life

• No data security

• Used analog signals


2G-Second generation

2G refers to the second generation of mobile telephony which used digital signals
for the first time. It was launched in Finland in 1991 and used GSM technology.
2G networks used digital technology.
It implemented the concept of CDMA and GSM. Provided small data services like
SMS and mms.
2G capabilities are achieved by allowing multiple users on a single channel via
multiplexing.

Features:
• Data speeds up to 64 kbps
• Text and multimedia messaging possible
• Better quality than 1G
• 2G requires strong digital signals to help mobile phones work. If
there is no network coverage in any specific area, digital signals
would weak.
• These systems are unable to handle complex data such as Videos.
When GPRS technology was introduced, it enabled web browsing, e-mail services
and fast upload/download speeds. 2G with GPRS is also referred as 2.5G, a step

13
short of next mobile generation
3G- Third generations
Third generation (3G) of mobile telephony began with the start of the new
millennium and offered major advancement over previous generations.
3G has multimedia services support along with streaming. In 3G universal access
and portability across different devices types are made possible.
3G increased the efficiency of frequency spectrum by improving how audio is
compressed during a call. so more simultaneous calls can take place in same
frequency range.
Like 2G, 3G evolved into 3.5G and 3.75G as more features were introduced in
order to bring about 4G.
Features:
• Data speeds of 144 kbps to 2 Mbps
• High speed web browsing
• Running web based applications like video conferencing, multimedia
e-mails, etc.
• Fast and easy transfer of audio and video files
• 3D gaming
• TV Streaming/ Mobile TV/ Phone Calls MUM1 Large Capacities
and Broadband Capabilities
• Expensive fees for 3G Licenses Services

4G- Fourth generation


The main purpose of 4G is to provide high speed, high quality and high capacity
to users while improving security and lower the cost of voice and date services,
multimedia and internet over IP. Fourth Generation (4G) mobile phones provides
broadband cellular network services and is successor to 3G mobile networks. It
provides an all IP based cellular communications. The capabilities provided
adhere to IMT-Advanced specifications as laid down by International
Telecommunication Union (ITU).

Features
• It provides an all IP packet switched network for transmission of
voice, data, signals and multimedia.
• It aims to provide high quality uninterrupted services to any location
14
at any time.
• As laid down in IMT-Advanced specifications, 4G networks should
have peak data rates of 100Mbps for highly mobile stations like train,
car etc., and 1Gbps for low mobility stations like residence etc.
• It also lays down that 4G networks should make it possible for 1 Gbps
downlink over less than 67 MHz bandwidth.
• They provide have smooth handoffs across heterogeneous network
areas.
5G- Fifth generation

• 5G is the 5th generation mobile network. It is a new global wireless standard


after 1G, 2G, 3G, and 4G networks. 5G enables a new kind of network that
is designed to connect virtually everyone and everything together including
machines, objects, and devices.5G wireless technology is meant to deliver
higher multi-Gbps peak data speeds, ultra low latency, more reliability,
massive network capacity, increasedavailability, and a more uniform user
experience to more users. Higher performance and improved efficiency
empower new user experiences and connects new industries.Features
• High Speed, High Capacity 5G technology providing large broadcasting
of data in Gbps.
• Multi - Media Newspapers, watch T. V pro clarity as to that of an HD
Quality.
• Faster data transmission that of the previous generations.
• Large Phone Memory, Dialing Speed, clarity in Audio/Video.
• Support interactive multimedia, voice, streaming video, Internet and other
5G is More Effective and More Attractive.

18. Consider a network with 8 computers, which network architecture should be


used peer to peer or Client Server? Justify the answer {4 marks}

Ans:
In the question it is given that we are supposed to consider eight
computers. Both architecture can be considered depending upon the
requirement. for eight computers I would like to prefer Peer to Peer
network architecture.

• The number of computers or devices in the network is less than 15. For
peer to peer network less than 10 devices shows good performance.
• Data security is not the top priority

15
• Networking is mainly required for hardware sharing.
• Advanced sharing is not required.
• Additional networking features are not required.
• The administrator personally knows all users of the network.
• The above conditions are usually fulfilled in home and small office
networks. Thus, peer-to-peer networking is mostly used in home and small
office networks.
• Less costly

Also, if security is in priority and cost is not the consideration then I would prefer
client server network it will provide a stable network.

19. Compare packet switched and circuit switched network { 4 marks }

Ans:

Packet switching circuit switching


In-circuit switching has there are 3 In Packet switching directly data transfer
phases: takes place.
i)Connection Establishment.
ii) Data Transfer.
iii) Connection Released.
In-circuit switching, each data unit knows In Packet switching, each data unit just knows
the entire path address which is the final destination address intermediate path
provided by the source. is decided by the routers.
In-Circuit switching, data is processed In Packet switching, data is processed at all
at the source system only nodes including the source system.

Resource reservation is the feature of There is no resource reservation because


circuit switching because the path is bandwidth is shared among users.
fixed for data transmission.
Wastage of resources is more in Circuit Less wastage of resources as compared to
Switching Circuit Switching
Transmission of the data is done by the Transmission of the data is done not only by
source. the source but also by the intermediate routers.

In-Circuit switching, the charge depends In Packet switching, the charge is based on the
on time and distance, not on traffic in the number of bytes and connection time.
network.

16
Recording of packets is never possible in Recording of packets is possible in packet
circuit switching. switching.

In-Circuit Switching there is a physical In Packet Switching there is no physical path


path between the source and the between the source and the destination
destination
Circuit Switching does not support store Packet Switching supports store and forward
and forward transmission transmission

Call setup is required in circuit switching. No call setup is required in packet switching.

In-circuit switching each packet follows In packet switching packets can follow any
the same route. route.

The circuitswitching network is Packet switching is implemented at the


implemented at the physical layer. datalink layer and network layer

Circuit switching requires simple Packet switching requires complex


protocols for delivery. protocols for delivery.

20. Explain satellite communication.{ 4 marks }


Ans:

17
1. Satellite is a manmade system which is kept in continuous rotation around
the earth in a specific orbit at a specific height above the earth and with
specific speed.
2. In satellite communication, signal transferring between the sender and
receiver is done with the help of satellite.
3. In this process, the signal which is basically a beam of modulated
microwaves is sent towards the satellite called UPLINK (6 GHz).
4. Then the satellite amplifies the signal and sent it back to the receiver’s
antenna present on the earth’s surface called as DOWNLINK (4Ghz),
as shown in the diagram given

21.Describe the process of DHCP server configuration. {4 marks }


Ans:
Configuring the DHCP Server

To configure the DHCP server:

1. From the Control Panel, go to Administrative Tools >> Computer Management


>> Services and Application >> DHCP.

2. From the Action menu, select New Scope. The New Scope wizard is displayed.

3. Enter the following information as prompted:

• Scope name and description:


• IP address range (for example, 192.168.0.170 to 192.168.0.171)
• Subnet mask (for example, 255.255.255.0)
• Add exclusions (do not exclude any IP addresses)
• Lease duration (accept the default of 8 days)
• Router (default gateway) of your subnet (for example, 192.168.0.1)
• Domain name, WINS server (these are not needed)
• Activate Scope? (select “Yes, I want to activate this scope now”)
4. Click Finish to exit the wizard. The contents of the DHCP server are listed.

5. Right-click Scope [iPad dress] scope-name and select Properties.

6. In the Scope Properties box, click the Advanced tab.

18
7. Select BOOTP only, set the lease duration to Unlimited, and click OK. Right-
click Reservations. The Controller A Properties box is displayed

22. Explain the working of hub, switch and bridge { 6 marks }

Ans:
I. Hub:

Hubs are networking devices operating at a physical layer of the OSI model that
are used to connect multiple devices in a network. They are generally used to
connect computers in a LAN.
Working:
A hub has many ports in it. A computer which intends to be connected to the
network is plugged in to one of these ports. When a data frame arrives at a port, it
is broadcast to every other port, without considering whether it is destined for a
particular destination device or not.

Features of Hubs
• A hub operates in the physical layer of the OSI model.
• A hub cannot filter data. It is a non-intelligent network device that sends
message to all ports.
• It primarily broadcasts messages. So, the collision domain of all nodes
connected through the hub stays one.
Transmission mode is half duplex.

Fig. Working of Netowrk Hub

19
II. Switch:

Switches are networking devices operating at layer 2 or a data link layer of the OSI
model. They connect devices in a network and use packet switching to send,
receive or forward data packets or data frames over the network.
Working:
A switch has many ports, to which computers are plugged in. When a data frame
arrives at any port of a network switch, it examines the destination address, performs
necessary checks and sends the frame to the corresponding device(s). It supports
unicast, multicast as well as broadcast communications.

Fig. Working of Switch

III. Bridge:
Bridges are used to connect similar network segments. It combines two LANs to
form an extended LAN.

Working:
A bridge accepts all the packets and amplifies all of them to the other side. The
bridges are intelligent devices that allow the passing of only selective packets from
them. A bridge only passes those packets addressed from a node in one network to
another node in the other network.

20
Fig. Working of Bridge

23. Explain multiplexing techniques. { 6 mark }


Ans:
Multiplexing is the set of techniques that allows the simultaneous transmission of
multiple signals across a single data link.

21
o Frequency-Division Multiplexing

Frequency-division multiplexing (FDM) is an analog technique that can be


applied when the bandwidth of a link (in hertz) is greater than the combined
bandwidths of the signals to be transmitted. In FOM, signals generated by
each sending device modulate different carrier frequencies. These modulated
signals are then combined into a single composite signal that can be
transported by the link. Carrier frequencies are separated by sufficient
bandwidth to accommodate the modulated signal. These bandwidth ranges
are the channels through which the various signals travel. Channels can be
separated by strips of unused bandwidth- guard bands-to prevent signals from
overlapping. In addition, carrier frequencies must not interfere with the
original data

Fig. Frequency-Division Multiplexing

In above figure, the transmission path is divided into three parts, each
representing a channel that carries one transmission.

o Wavelength-Division Multiplexing

Wavelength-division multiplexing (WDM) is designed to use the high-data-


rate capability of fiber-optic cable. The optical fiber data rate is higher than
the data rate of metallic transmission cable. Using a fiber-optic cable for one
single line wastes the available bandwidth. Multiplexing allows us to
combine several lines into one.

WDM is conceptually the same as FDM, except that the multiplexing and
de-multiplexing involve optical signals transmitted through fiber-optic
channels. The idea is the same: We are combining different signals of
different frequencies. The difference is that the frequencies are very high.

22
Fig: Wavelength-Division Multiplexing

o Time-Division Multiplexing

Time-division multiplexing (TDM) is a digital process that allows several


connections to share the high bandwidth of a linle Instead of sharing a
portion of the bandwidth as in FDM, time is shared. Each connection
occupies a portion of time in the link.

Figure gives a conceptual view of TDM. Note that the same link is used as
in FDM; here, however, the link is shown sectioned by time rather than by
frequency. In the figure, portions of signals 1,2,3, and 4 occupy the link
sequentially.

Fig: Time-Division Multiplexing

We also need to remember that TDM is, in principle, a digital multiplexing


technique. Digital data from different sources are combined into one
timeshared link. However, this does not mean that the sources cannot
produce analog data; analog data can be sampled, changed to digital data,
and then multiplexed by using TDM.

23
24. Explain the working of following topologies: {6 marks}
1) Bus
2) Ring
3) Tree

Ans:
Bus Topology:

o In networking, a topology that allows all network nodes to receive the same
message through the network cable at the same time is called as bus topology.

o In this type of network topology, all the nodes of a network are connected to
a common transmission medium having two endpoints.

o All the data that travels over the network is transmitted through a common
transmission medium known as the bus or the backbone of the network.

o When the transmission medium has exactly two endpoints, the network
topology is known by the name, 'linear bus topology'. A network that uses a
bus topology is referred to as a “Bus Network”.

Fig. Bus Network Topology

Working of Bus Topology:


o Fig.shows bus topology. The central cable is the backbone of the network
and is known as Bus (thus the name). Every workstation or node
communicates with the other device through this Bus.
24
o A signal from the source is broadcasted and it travels to all workstations
connected to bus cable. Although the message is broadcasted but only the
intended recipient, whose MAC address or IP address matches, accepts it

o If the MAC/IP address of machine does not match with the intended address,
machine discards the signal. A terminator is added at ends of the central
cable, to prevent bouncing of signals. A barrel connector can be used to
extend it.

II.Ring Topology:

o Ring topology is a network topology that is set-up in circular fashion. It


is called ring topology because it forms a ring as each computer is
connected to another computer, with the last one connected to the first.
Exactly two neighbors for each device.
o Each node in this topology contains repeater. A signal passes node to node,
until it reaches its destination. If a node receives a signal intended for
another node its repeater regenerates the signal and passes it.

o Token is a special three-byte frame that travels around the ring


network. It can flow clockwise or anticlockwise. Ring topology is a
point to point network.

o The transmission is unidirectional, but it can be made bidirectional by


having 2 connections between each network node, it is called Dual Ring
Topology.

o In dual ring topology, two ring networks are formed, and data flow is in
opposite direction in them. Also, if one ring fails, the second ring can act
as a backup, to keep the network up.

o In a ring network, the data and the signals that pass over the network travel
in a single direction. In ring topology network arrangement, a signal is
transferred sequentially using a ‘token’ from one node to the next.

25
Fig. Ring Network Topology

Tree Topology:
o As its name implies in this topology devices make a tree structure. Tree
topology integrates the characteristics of star and bus topology.
o In tree topology, the number of star networks are connected using Bus.
This main cable seems like a main stem of a tree, and other star networks
as the branches.
o It is also called expanded star topology. Ethernet protocol is commonly
used in this type of topology.
o Fig. shows tree topology. A tree topology can also combine characteristics
of linear bus and star topologies. It consists of groups of star configure
workstations connected to a linear bus backbone cable.
o Tree topologies allow for the expansion of an existing network and
enable schools to configure a network to meet their needs.

26
Fig. Tree Topology

25.

27

You might also like