Bus topology, Computer Network Security


In a bus topology all devices are attached to a single long cable and any device can send data to any other device. For this function, coordination is needed to decide which device has to need the line at what time. The bus topology is given below:


2080_bus topology.png


Figure  Bus topology


Posted Date: 7/30/2012 6:52:25 AM | Location : United States

Related Discussions:- Bus topology, Assignment Help, Ask Question on Bus topology, Get Answer, Expert's Help, Bus topology Discussions

Write discussion on Bus topology
Your posts are moderated
Related Questions
Question: (a) Give 2 benefits of using IPsec. (b) IPSec uses two protocol for security: Authentication Header protocol (AH) and the Encapsulated Security Header Protocol (

RISK ASSESSMENT Risk assessment is a step in a risk management technique. Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete

What is information security Information security protects information (and facilities and systems which store, use and transmit it) from a broad range of threats, in order to p

RSA Block and Vernam Stream Ciphers This assignment involves writing two small Python scripts and a report. Before you start you must download the ?le summarysheets.zip from th

Information and Network Security Part 1- Recovery of an encrypted `word' using a forward search attack. Complete and correct summary for part 1. Adequately commented, clea

Explain how can we achieved privacy in an e-mail system.  The full form of PEM is Privacy Enhanced Mail: PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted

Question : Environmental Accounting is a means for businesses to fulfill their responsibilities for accountability to stakeholders. (a) What do you understand by Environment

implementing password policy in organisation