Bus topology, Computer Network Security

 

In BUS topology every computer is directly connected to primary network cable in a single way. Bus networks are the easiest way to connect multiple users, but can have problems when two users want to transfer at the same time on the similar bus. Thus machines which need bus network architectures usually have some scheme of collision avoidance or collision handling for communication on the bus, quite usually using Carrier Sense Multiple Access or the attendance of a bus master which operates access to the shared bus source.

 

 

1257_Bus Topology.png

Posted Date: 8/20/2012 3:10:55 AM | Location : United States







Related Discussions:- Bus topology, Assignment Help, Ask Question on Bus topology, Get Answer, Expert's Help, Bus topology Discussions

Write discussion on Bus topology
Your posts are moderated
Related Questions
IPv6 ADDRESSING IPv6 has 128-bit addresses. A 128-bit address adds network prefix and host suffix. An benefit of IPv6 addressing is that there is address classes i.e. prefix/s

Question An organization is planning to connect its networks to the Internet. The network is located within a four story building. A web server supporting online sales is also

BALANCING SECURITY AND ACCESS Even with best planning and implementation, it is impossible to obtain perfect security, that is, it is a process, not an absolute. Security should

how to form the trojan integrated cirucit and what are the tools are used to simulate the ciruit to our system and how to pass it as input to the clustering algorithm to get the ou

Question 1 a) Provide three advantages of using optical fiber. b) Distinguish between "Direct Sequence Modulation" and "Frequency Hopping" c) Decribe the purpose of using "

Documenting the Results of Risk Assessment The goal of this process is to recognize the information assets, list them, and rank according to those most required protection. The

QUESTION a) "Two of the key attributes of an enterprise network is that it have to be multi-platform and multisite." Decribe what you understand by this statement. b) A

Belady's Anomaly Also known FIFO anomaly. Generally, on raising the number of frames given to a process' virtual storage, the program execution is faster, because lesser page


Problem (a) The IEEE 802 series of standards describe both the Physical and Data Link layers of their respective technologies. Two important standards are 802.3 and 802.5, respect