define broadcast, Computer Network Security

In broadcast topology there are further two types

1) SATELLITE\RADIO 2) RING TOPOLOGY

In a radio or satellite topology every computers are connected to each other via radio or satellite wave as given in the figure.

 

1444_Ring Topology and Satellite-Radio Topology.png

 

 

                                           Figure: Satellite and Ring topologies:

In a ring topology every computer is connected to thorough a ring as given in the figure above.

 

Posted Date: 7/30/2012 3:31:04 AM | Location : United States







Related Discussions:- define broadcast, Assignment Help, Ask Question on define broadcast, Get Answer, Expert's Help, define broadcast Discussions

Write discussion on define broadcast
Your posts are moderated
Related Questions
B a s i c functions of e-mail system are given as follows: C o mp o sition refers to the procedure of creating messages and the answers. Though any text editor can be

Network Virtual Terminal It is a set of principles describing a very simple virtual terminal interaction. The NVT is needed in the start of a Telnet session. Communication wit

DEPLOYMENT AND IMPLEMENTING OF AN IDS The strategy for deploying IDS should consider various factors. These factors will determine the number of administrators required to insta

Problem 1: List measurable entities on which the quality of service in a data communication network depends Problem 2: Show the features of a typical Network Management

ADDRESS RESOLUTION PROTOCOL (ARP) TCP/IP can use any of the three address resolution functions relaying on the addressing procedure used by the underlying hardware. To guarant

Question: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume the following: the signal level for the previous bit for NRZI was a 1

Packet Filtering Firewall Packet filtering is a network security mechanism that works by controlling what data can flow in and out of the network. The basic device that interco

CarALouer provides rental of cars to its customer on a regional basis i.e. a car is attached to a regional home-base which also houses a regional office of the company. Each regi

Q. Secure routing Protocols for Wireless Sensor Networks? A secure routing information protocol enables effective implementation of authentication and integrity checking defens

QUESTION An analog sensor is used to monitor the temperature of sea water at different depth. The sensor is fitted to a buoy and incorporates a wireless transmitter that send