define broadcast, Computer Network Security

In broadcast topology there are further two types


In a radio or satellite topology every computers are connected to each other via radio or satellite wave as given in the figure.


1444_Ring Topology and Satellite-Radio Topology.png



                                           Figure: Satellite and Ring topologies:

In a ring topology every computer is connected to thorough a ring as given in the figure above.


Posted Date: 7/30/2012 3:31:04 AM | Location : United States

Related Discussions:- define broadcast, Assignment Help, Ask Question on define broadcast, Get Answer, Expert's Help, define broadcast Discussions

Write discussion on define broadcast
Your posts are moderated
Related Questions
how would land elevation have canged if coronado had traveled 150 miles due west from what is today arizona instead of west toward new mexico

Question : (a) There are two approaches for providing confidentiality for packets in a network using symmetric encryption: End-to-End Encryption and Link Encryption. State wh

Question 1 a) Provide three advantages of using optical fiber. b) Distinguish between "Direct Sequence Modulation" and "Frequency Hopping" c) Decribe the purpose of using "

BUS TOPOLOGY In a bus topology all devices are attached to a single long cable and any device can send data to any other device. For this function, coordination is needed to d

Cost Benefit Analysis (CBA) The common approach for information security controls is economic feasibility of implementation. CBA is begun by evaluating the worth of assets which

what are the participant of marketing channal?

RISK ASSESSMENT Risk assessment is a step in a risk management technique. Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete

Question 1 (a) Explain briefly the following terms as used in network security: (i) Denial of service (DoS) attack (ii) Birthday attack (iii) DeMilitarized Zone

You are designing a Demilitarized zone for a large corporation. Using design best practice, and the information that you have learned so far, propose a design that will provide the

Question: (a) What do you meant by the term diffusion and confusion? Explain how diffusion and confusion can be implemented. (b) Distinguish between authorisation and auth