Bus topology, Computer Network Security

 

In BUS topology every computer is directly connected to primary network cable in a single way. Bus networks are the easiest way to connect multiple users, but can have problems when two users want to transfer at the same time on the similar bus. Thus machines which need bus network architectures usually have some scheme of collision avoidance or collision handling for communication on the bus, quite usually using Carrier Sense Multiple Access or the attendance of a bus master which operates access to the shared bus source.

 

 

1257_Bus Topology.png

Posted Date: 8/20/2012 3:10:55 AM | Location : United States







Related Discussions:- Bus topology, Assignment Help, Ask Question on Bus topology, Get Answer, Expert's Help, Bus topology Discussions

Write discussion on Bus topology
Your posts are moderated
Related Questions
How does the POP functions? What are the advantages/benefits of IMAP over POP? POP stands for Post Office Protocol, version 3 (POP3) is one of the easiest message access protoc

Hello i have submitted an assignment and i am still waiting to know if it has been accepted or not the ref number is TicketID: EM201381BRY525CN, the due date is for monday 27th of

WHY USE AN IDS? IDS prevent from problem behaviors by increasing the perceived risk of discovery and punishment. Detect the attacks and other security violations. Detect and at

Information asset classification-risk management A number of organizations have data classification schemes (for instance confidential, internal, public data). The classificat

Identify Possible Controls For each threat and linked vulnerabilities which have residual risk, create primary list of control ideas. Residual risk is the risk which remains to

Question : (a) What is an IDS and what is the basic problem it faces which can be solved by Artificial Intelligence. (b) Identify and describe briefly an Artificial Intell

Network Virtual Terminal It is a set of principles describing a very simple virtual terminal interaction. The NVT is needed in the start of a Telnet session. Communication wit

Write down the short notes on VTR.  Communication between different types of the equipment and software is made possible by making use of the networks. Full-screen text editor is s

Cost Benefit Analysis (CBA) The common approach for information security controls is economic feasibility of implementation. CBA is begun by evaluating the worth of assets which

Elements of Cryptosystems Cryptosystems is characteristically made up of algorithms, data handling techniques, and procedures which are combined in multiple ways to ensure confi