Bus topology, Computer Network Security

 

In BUS topology every computer is directly connected to primary network cable in a single way. Bus networks are the easiest way to connect multiple users, but can have problems when two users want to transfer at the same time on the similar bus. Thus machines which need bus network architectures usually have some scheme of collision avoidance or collision handling for communication on the bus, quite usually using Carrier Sense Multiple Access or the attendance of a bus master which operates access to the shared bus source.

 

 

1257_Bus Topology.png

Posted Date: 8/20/2012 3:10:55 AM | Location : United States







Related Discussions:- Bus topology, Assignment Help, Ask Question on Bus topology, Get Answer, Expert's Help, Bus topology Discussions

Write discussion on Bus topology
Your posts are moderated
Related Questions
ROUTING TABLE For efficiency, information about forwarding is saved in a routing table, which is started at system initialization and must be updated as network topology modif

Data units at different layers of the TCP/ IP protocol suite The data unit prepared at the application layer is known a message, at the transport layer the data unit build is

Spambot Detection: The  previous studies in this field  have focused on content and meta-content based features.  The main assumption in this area of spam detection of late is

Hardware, Software, and Network Asset Identification What information attributes to track is dependent on: •    Requires of organization/risk management efforts •    Management

QUESTION (a) (i) Describe Phishing attacks. (ii) Distinguish between Phishing and Spear Phishing attacks. (b) Describe two instances where an attacker sniffing on a netwo


Problem (a) As a forensic investigator, you are needed to trace the source of an email. It is suspected that the email header has been forged. Show how you would proceed to

what are the participant of marketing channal?

QUESTION (a) Consider the following authentication options A. Using password B. Using pin and fingerprint Which option A or B provides stronger security and why? (b