define broadcast, Computer Network Security

In broadcast topology there are further two types

1) SATELLITE\RADIO 2) RING TOPOLOGY

In a radio or satellite topology every computers are connected to each other via radio or satellite wave as given in the figure.

 

1444_Ring Topology and Satellite-Radio Topology.png

 

 

                                           Figure: Satellite and Ring topologies:

In a ring topology every computer is connected to thorough a ring as given in the figure above.

 

Posted Date: 7/30/2012 3:31:04 AM | Location : United States







Related Discussions:- define broadcast, Assignment Help, Ask Question on define broadcast, Get Answer, Expert's Help, define broadcast Discussions

Write discussion on define broadcast
Your posts are moderated
Related Questions
Question An organization is planning to connect its networks to the Internet. The network is located within a four story building. A web server supporting online sales is also

In Star topology all computers are connected using a central device known as hub. Star networks are one of the most general computer network topologies. In its simplest way, a

Get a copy of Metasploitable at Make">http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ Make sure to follow these directions very carefully. You will get po

SDES encryption and decryption

Da t a compre s sion and the trans p ort s e rvices,   The main purpose of the transport layer is to provide services which are efficient, reliable and cost-effecti

UDP DATAGRAM FORMAT: It is given in the figure below:

#Under what circumstances would the use of a SecSDLC be more appropriate than an SDLC?

KASONet Pinging System: Project Title:                                                           "KASONet Pinging System"   Brief Overview of Project: The o

INFORMATION SECURITY POLICY PRACTICES AND STANDARDS Management from all the communities of interest should consider policies as basis for all information security efforts. Polic

Cipher Methods There are 2 methods of encrypting plaintext: • Bit stream method – every bit in the plaintext bit is transformed into a cipher bit one bit at a time. • Block cip