Bus topology, Computer Network Security

 

In BUS topology every computer is directly connected to primary network cable in a single way. Bus networks are the easiest way to connect multiple users, but can have problems when two users want to transfer at the same time on the similar bus. Thus machines which need bus network architectures usually have some scheme of collision avoidance or collision handling for communication on the bus, quite usually using Carrier Sense Multiple Access or the attendance of a bus master which operates access to the shared bus source.

 

 

1257_Bus Topology.png

Posted Date: 8/20/2012 3:10:55 AM | Location : United States







Related Discussions:- Bus topology, Assignment Help, Ask Question on Bus topology, Get Answer, Expert's Help, Bus topology Discussions

Write discussion on Bus topology
Your posts are moderated
Related Questions
QUESTION (a) What do you meant by data spoliation? (b) Justify the following statement: "Disk imaging differs from creating a standard backup of disk." (c) Why do yo

ADDRESS MASKS To identify receiver, network apply address mask to receiver address and calculate to network address in routing table. It can use Boolean 'and' to calculate the

The objective of this example is to demonstrate the steps required for a successful attack against a vulnerable Windows XP SP2 system. It will show: a) how Nessus can be used to di

Broadcasting is the distribution of video and audio content to a whole audience via any audio or visual mass communications medium, but generally one using electromagnetic radiat

Enterprise Information Security Policy (EISP) EISP also known as security policy directly supports the mission of the organization and sets the strategic direction, scope, and t

Public Key Infrastructure (PKI) It is integrated system of software, encryption methodologies, protocols, legal agreements, and 3rd-party services enabling users to communicate

Categories of Controls Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the co

ADDRESS RESOLUTION WITH TABLE LOOKUP : Resolution needs data structure that has information about address binding. A distinct address-binding table is used for every physical n

Hashing is the transformation of a string of characters into a generally shorter fixed-length key or a value that presents the original string. Hashing is used to index and retri

QUESTION (a) One of the biggest drawbacks that GNS3 has is that it supports only the IOS images of routers. This means that users cannot emulate Cisco switches. Suggest two sol