You are on page 1of 4

INTRODUCTION (spoken)

SLIDE 2- Every workstation connected to the hub is indirectly connected to


each workstation using the hub as an intermediary device. Star networks are
typically deployed at the access layer of enterprise networks. The access
layer uses a centralized network switch to connect all endpoints to the rest of
the LAN.

This graphic shows a star network consisting of a central hub. Each


workstation is shown as a PC or laptop with the central hub interconnecting all
devices. The lines that interconnect endpoint PCs and laptops are the spokes
of the star topology. In the real world, a star network can consist of either
wired or wireless connections. In this specific case, each spoke is connected
to a hub by a wired connection.

SLIDE 3-Star Network Topology plays a pivotal role in connecting various


devices to share information in real-time and to execute transactions online.
The choice of the topology depends on the physical environment of the
organization, end-user requirements and the level of IT investments. It is
needless to say that right network topology will have to be selected before
installation and it will be too costly to change it later.

SLIDE 4-Unlike Mesh topology, star topology doesn’t allow direct communication
between devices, a device must have to communicate through hub. If one device
wants to send data to other device, it has to first send the data to hub and then
the hub transmit that data to the designated device.
SLIDE 5- Because a star network uses a centralized hub, that hub is
responsible for controlling communications between devices. However, there
are different ways that a central hub can manage these communications. For
example, an Ethernet hub is a network device that simply listens to a
communication destined for a device on a different spoke and then
retransmits -- or broadcasts -- the message out to all spokes. This is the
simplest form of a network hub, as it only must repeat the message to all other
connected spokes. But this method can become inefficient quickly, as each
communication is sent out to all spokes, as opposed to only the spoke the
message was intended for.

To interpret it in a simpler method

If a computer in an office wants to send a communication to another


computer in a remote office, it sends the data along with the recipient address
to the Hub/Switch it is connected to. The Hub/Switch transfer the data to the
end destination through routers and other network resources and network
management software keeps track of the data delivery.

SLIDE 6- Why we use Star Topology?


Star topologies are preferred over others due to its following unique features.
1. Centralization
Hub/Switches acts as a central monitoring agency on the performance of the

individual nodes and glitches in the performance can be easily tracked and

rectified. If the Switch/Hub are the bottlenecks, the capacity of the Hub/switch

can be enhanced.

2. Scalability
New nodes can be easily added in the network without affecting the network

performance. Centralized control of the network helps easy manageability and

quick scalability of the star network.

3. easy trouble shooting and maintenance


Each node is connected by a separate link to central Hub in this network and

in case of any issues in any of the nodes in the network, the problematic node

can be isolated and the rest of the network can function unaffected. This

topology is simple to understand and troubleshoot and hence the downtime

of these networks is significantly lower.


4. High-performance level
This topology avoids unwanted traffic in the network by sending the data

pockets to the target node directly and hence performance of this network is

superior to any other topologies. Data packets are delivered to the recipient in

the shortest possible time, unlike the other networks.

CONCLUSION- A Star Network Topology is best suited for smaller

networks and works efficiently when there is limited number of nodes.

One has to ensure that the hub or the central node is always working and

extra security features should be added to the hub because it s the heart

of the network.

You might also like