QUEST_CA
TOPOLOGY
NETWORK TOPOLOGY
In communication networks, a topology is a usually schematic description of the arrangement of a network, including
its nodes and connecting lines. There are two ways of defining network geometry: the physical topology and the
logical (or signal) topology.
The most commonly used topology are describe below
Bus Toplology
In the bus network topology, every workstation is connected to a main cable
called the bus. Therefore, in effect, each workstation is directly connected to
every other workstation in the network.
Advantages (benefits) of Linear Bus Topology
1) It is easy to set-up and extend bus network.
2) Cable length required for this topology is the least compared to other
networks.
3) Bus topology costs very less.
4) Linear Bus network is mostly used in small networks. Good for LAN.
Disadvantages (Drawbacks) of Linear Bus Topology
1) There is a limit on central cable length and number of nodes that can be connected.
2) Dependency on central cable in this topology has its disadvantages. If the main cable (i.e. bus) encounters some
problem, whole network breaks down.
3) Proper termination is required to dump signals. Use of terminators is must.
4) It is difficult to detect and troubleshoot fault at individual station.
5) Maintenance costs can get higher with time.
6) Efficiency of Bus network reduces, as the number of devices connected to it increases.
7) It is not suitable for networks with heavy traffic.
8) Security is very low because all the computers receive the sent signal from the source
RING TOPOLOGY
In the ring network topology, the workstations are connected in a closed loop configuration. Adjacent pairs of workstations
are directly connected. Other pairs of workstations are indirectly connected, the data passing through one or more
intermediate nodes.
Advantages of Ring Topology
1) This type of network topology is very organized. Each node gets to send the data when it receives an empty
token. This helps to reduces chances of collision. Also in ring topology all the traffic flows in only one direction at
very high speed.
2) Even when the load on the network increases, its performance is better than that of Bus topology.
3) There is no need for network server to control the connectivity between workstations.
Specialist in Coaching for : BANKING, SSC, RAILWAY, INTERVIEW(GD/PI), PET, CAMPUS, CTET, OTET, OSSTET, B.ED.
Plot No. - 215, Saheed Nagar, Bhubaneswar – 751007, Odisha, India
Contact: 9438734530, 9237424344
E-mail: [email protected], Website: www.questbbsr.org, Facebook: questbbsr24×7, App: QUEST BBSR
1
QUEST_CA
TOPOLOGY
4) Additional components do not affect the performance of network.
5) Each computer has equal access to resources.
Disadvantages Of Ring Topology
1) Each packet of data must pass through all the computers between source and destination. This makes it slower
than Star topology
2) If one workstation or port goes down, the entire network gets affected.
3) Network is highly dependent on the wire which connects different components.
STAR TOPLOGY
In the star network topology, there is a central computer or server to which all the workstations are directly connected.
Every workstation is indirectly connected to every other through the central computer.
Advantages of Star Topology
1) As compared to Bus topology it gives far much better performance, signals don’t necessarily get transmitted
to all the workstations. Performance of the network is dependent on the capacity of central hub.
2) Easy to connect new nodes or devices. In star topology new nodes can be added easily without affecting rest of
the network.Similarly components can also be removed easily.
3) Centralized management. It helps in monitoring the network.
4) Failure of one node or link doesn’t affect the rest of network. At the same time its easy to detect the failure and
troubleshoot it.
Disadvantages of Star Topology
1) Too much dependency on central device has its own drawbacks. If it fails whole network goes down.
2) The use of hub, a router or a switch as central device increases the overall cost of the network.
3) Performance and as well number of nodes which can be added in such topology is depended on capacity of
central device
TREE TOPOLOGY
The tree network topology uses two or more star networks connected together. The central computers of the star
networks are connected to a main bus. Thus, a tree network is a bus network of star networks.
Advantages of Tree Topology
1. It is an extension of Star and bus Topologies, so in networks where these
topologies can’t be implemented individually for reasons related to scalability, tree
topology is the best alternative.
2. Expansion of Network is possible and easy.
3. Here, we divide the whole network into segments (star networks), which can be
easily managed and maintained.
Specialist in Coaching for : BANKING, SSC, RAILWAY, INTERVIEW(GD/PI), PET, CAMPUS, CTET, OTET, OSSTET, B.ED.
Plot No. - 215, Saheed Nagar, Bhubaneswar – 751007, Odisha, India
Contact: 9438734530, 9237424344
E-mail: [email protected], Website: www.questbbsr.org, Facebook: questbbsr24×7, App: QUEST BBSR
2
QUEST_CA
TOPOLOGY
4. Error detection and correction is easy.
5. Each segment is prov ided with dedicated point-to-point wiring to the central hub.
6. If one segment is damaged, other segments are not affected.
Disadvantages of Tree Topology
1. Because of its basic structure, tree topology, relies heavily on the main bus
cable, if it breaks whole network is crippled.
2. As more and more nodes and segments are added, the maintenance becomes difficult.
MESH TOPOLOGY
The mesh network topology employs either of two schemes, called full mesh and partial mesh. In the full mesh topology,
each workstation is connected directly to each of the others. In the partial mesh topology, some workstations are connected
to all the others, and some are connected only to those other nodes with which they exchange the most data.
Advantages of Mesh topology
1) Data can be transmitted from different devices simultaneously. This topology can withstand high traffic .
2) Even if one of the components fails there is always an altlernative present. So data transfer doesn’t get affected.
3) Expansion and modification in topology can be done without disrupting other nodes.
Disadvantages of Mesh topology
1) There are high chances of redundancy in many of the network connections.
2) Overall cost of this network is way too high as compared to other network topologies.
3) Set-up and maintenance of this topology is very difficult. Even administration of the network is tough.
Specialist in Coaching for : BANKING, SSC, RAILWAY, INTERVIEW(GD/PI), PET, CAMPUS, CTET, OTET, OSSTET, B.ED.
Plot No. - 215, Saheed Nagar, Bhubaneswar – 751007, Odisha, India
Contact: 9438734530, 9237424344
E-mail: [email protected], Website: www.questbbsr.org, Facebook: questbbsr24×7, App: QUEST BBSR
3
QUEST_CA
TOPOLOGY
1. Unicode can be used to represent........ different characters. 4) Optical wire 5) None of these
1) 64 2) 256 3) 128 4) 512 5) None of these 24. In a Word document, ……… bar gives the information about
2. Text concatenation can be performed using the page number, number of pages etc.
1) Hash 2) Colon 3) Ampersand 4) Apostrophe 5) Exclamation 1) Tool 2) Menu 3) Task 4) Title 5) Status
3. ................ is not a graphic file format that allows animation 25. Alternate key is considered as a part of key
to be viewed on a computer. 1) Primary 2) Foreign 3) Candidate 4) Composite 5) Super\
1) GIF 2)MNG 3)MPS 4)SVG 5) SWF 26. In OSI model, the job of dialogue control and token
4. The storage area present in the e-mail account is often called as management is performed by layer.
1) hyperlink 2) attachment 3) Mailbox 4) IP address 5) Spam 1) Presentation 2) Network 3) Session4) Transport5) Datalink
5. ............. is called as the core of Unix operating system. 27. The process of moving from main memory to disk is called
1) Utility 2) Kernel 3) Device drivers 4) Shell 5) Memory 1) Caching 2) Swapping 3) Spooling 4)Transferring 5)Scheduling
6. In Excel, template is a 28. Which of the following is an absolute cell reference?
1) Title 2) Heading 3) Pattern 4) Theme 5) Menu 1) ! A!! 2)$A$1 3) #A#1 4)A1 5)-A-1
7. .......... printer prints the same letter continulusly in a line 29. In Baudot code, how many number of bits per symbol are used.
1) Dot -matrix 2) Chain 3) Laser 4) Drum 5) Line 1) Seven 2) five 3) six 4) eight 5) two
8. Which of the following languages is used to retrieve data from data base? 30. same of a file in MS Word cannot contain
1) DDL 2) DCL 3) DML 1) Letter 2) Space 3) Number 4) Underscore 5) None of these
4) Any of the above 5) None of the above 31. A top-to bottom relationship among the data items in a
9. Which of the following stores the data temporarily? database is established by a
1)RAM 2) ROM 3) Floppy disk 4) Hard disk 1) Hierarchical scheme 2) Sub scheme 3)Network scheme
10. In powerpoint, ......... is not present in formating toolbar 4) Relational scheme 5) Any of above
1) left align 2) center 3) justify 4) right align 5) None of these 32. Digitising Tablet us used to
11. RTF stands for 1)sense the presence or absence of mark.
1) Real Time Formating 2) Rich text Format 2) identify the product 3) read text from paper
3) Real Time fonts 4) Teal Text Format 5) None of these. 4) recognize character 5) enter drawings and sketches into computer.
12. 1024MB is equla to 33. Java programming language is
1) One Gigabyte 2) One Kilobyte 3) One Megabyte 1) OS-dependent 2) OS-Independent 3) Hardware- independent
4) One Trillion bytes 5) None of these 4) Both (1) and (3) 5) Both (2) and (3)
13. ............... punctuation ends most lines of C code. 34. Web browsers
1) ‘(single quote) 2) ; (Semi-colon) 3). (dot) 1) enable a user to visit a server computer's site directly.
4) : (colon) 5) “ (double quote) 2). Enable user to create and maintain a personal hotlist
14. ......... register holds the contents of accessed memory ward of favourite URL.
1) I/o 2) Instruction 3) Memory Buffer 3) have a history feature
4) Memory address 5) Accumulation 4) enable a user to download information in various formats.
15. The RDBMS terminology for a row is 5) All of the above
1) relation 2)attribute 3) degress 4) tuple 5)None of these 35. The monitor of a computer is connected to it by a
16. Dijkstra’s banker’s algorithm is used to resolve....... problem 1) Modem 2) Line Drivere 3) Wire 4) Cable (5) Bus
1) Deadlook Prevention 2) Deadlock Recovery 36. Compatibility concerns
3) Cache Conerence 4) Deadlock Avoidance. 5) Mutual Exclusion 1) only OS 2) Only software 3)only hardware
17. WIMAX technology is based on the IEEE .......... standard. 4) both OS and hardware 5) both hardware and software
1) 802.13 2) 802.15 3) 802.11 4)802.16 5) 802.14 37. Process is/are
18. To indicate decision point in a program, a ....... shaped symbol is used. 1) Contents of secondary memory. 2) contents of main memory
1)circle 2)rectangle 3)diamond 4)ellipse 5)Parallelogram 3) a program in execution 4) a job in secondary memory
19. Thesaurus option is available on ........ menu. 5) a job in execution
1) page layout 2) references 3) review 4) view 5) layout 38. You can delete one character at a time using …………key
20. The symbol is used to specify a cell range. 1) Edit 2) Format 3) Delete 4) Backspace 5) Both (3) and (4)
1) Slash 2) Hyphen 3) Colong 4) Comma 5) Asterisk 39. Android is a (n)
21. In physical layer, which of the following devices is not applicable? 1) Application software 2) Web browser
1) Repeater 2) Hub 3) Bridge 4) Switch 5) None of these. 3) Mobile operating system 4) Open international standard
22. In multitasking 5) None of these
1) we can use only one CPU 2) we follow single - user concept 40. Name box
3) we follow multi- user concept. 4) Both (1) and (2) 1) appears at the left of the formula bar.
5) Both (1) and (3) 2) appears below the menu bar.
23. .............. is frequently used to import videos t a computer. 3) shows the locations of the active cell.
1) software 2) Firewire 3) Firmware 4) Both (a) and (c) 5) Both (b) and (c)
Specialist in Coaching for : BANKING, SSC, RAILWAY, INTERVIEW(GD/PI), PET, CAMPUS, CTET, OTET, OSSTET, B.ED.
Plot No. - 215, Saheed Nagar, Bhubaneswar – 751007, Odisha, India
Contact: 9438734530, 9237424344
E-mail: [email protected], Website: www.questbbsr.org, Facebook: questbbsr24×7, App: QUEST BBSR