define broadcast, Computer Network Security

In broadcast topology there are further two types

1) SATELLITE\RADIO 2) RING TOPOLOGY

In a radio or satellite topology every computers are connected to each other via radio or satellite wave as given in the figure.

 

1444_Ring Topology and Satellite-Radio Topology.png

 

 

                                           Figure: Satellite and Ring topologies:

In a ring topology every computer is connected to thorough a ring as given in the figure above.

 

Posted Date: 7/30/2012 3:31:04 AM | Location : United States







Related Discussions:- define broadcast, Assignment Help, Ask Question on define broadcast, Get Answer, Expert's Help, define broadcast Discussions

Write discussion on define broadcast
Your posts are moderated
Related Questions
Question 1: (a) Define Artificial Intelligence. (b) Briefly describe the categories for the definition of Artificial Intelligence. (c) Identify the four basic types of

Develop a TCP-based client-server socket program for transferring a large message. The message transmitted from the client to server is read from a large file (size is about 30000

Question: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

The "Big Red Rocks" (BRR) mining company is based and operates in Western Australia. They are primarily an iron ore miner, but they also produce electricity through tidal power to

Question: (a) Data on four variables are stored in a file called file1.dat. The first line of the file is the variable names f, x, y and z. Give the R commands to (i) read t

Question: (a) What are the various options to mitigate risks in an Information Security Management System (ISMS)? For each option specify an instance where it can be used.

ADDRESS RESOLUTION WITH CLOSED-FORM COMPUTATION For networks use reliable addressing, it is possible to select an address that creates closed-form address resolution possible.

FRAGMENTATION One method is to limit datagram size to smallest MTU of any server. IP needs fragmentation i.e. datagrams can be divided into pieces to fit in network with small

What do you understand by cryptanalysis? Discuss about the transposition ciphers substitution cipher, and onetime pads. The messages which are intended to transmit secretly and

IPV6 DATAGRAM FORMAT It is given in the figure below: