Direct point-to-point communication:, Computer Network Security

Early networks used simple point-to-point communication. In such a method of communication every communication channel connects exactly two devices. In this way it prepares a mesh or point-to-point network, which is given in the figure below.

 

923_Point to Point communication.png

 

ADVANTAGES:

Direct point-to-point communication has the given advantages:

  • The connection type of individual connections may be distinct.
  • Individual connections may select a different frame format and error detection function etc.
  • It is easy to enforce privacy and security.

DISADVANTAGES:

Direct point-to-point communication has the given disadvantages:

  • The no. of connections increase more rapidly than the no. of computers
  • For 'n' devices connections = (n^2 - n)/2.
  • Most computers use the similar physical path.
  • Direct point-to-point communication is costly due to a no. of connections.
  • Another disadvantage is that adding a new device to the network needs N-1 new connections as given in the above figure.

 

Posted Date: 7/30/2012 5:59:08 AM | Location : United States







Related Discussions:- Direct point-to-point communication:, Assignment Help, Ask Question on Direct point-to-point communication:, Get Answer, Expert's Help, Direct point-to-point communication: Discussions

Write discussion on Direct point-to-point communication:
Your posts are moderated
Related Questions
Question: (i) ‘Implementation' is a critical stage of the Systems Development Life Cycle. Show the four approaches which are commonly used to implement information systems in

(a) Describe DES encryption with a block diagram and brief steps. (b) How does triple DES improve security. What is the effective key length of triple DES? How can 3DES be compa

ADDRESS RESOLUTION WITH MESSAGE EXCHANGE An alternative to local calculation is a distributed function. A computer that requires to find an address transmits a message across

QUESTION: (a) Ethernet has grown in popularity in the recent years and is now used in LANs. Give three reasons for the success behind Ethernet. (b) Ethernet uses the CSMA/CD

Illustrate about TinySec Protocol TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer

An overall rise in mobility, coupled with the falling cost of Wi-Fi equipment, has led to a proliferation of Wi-Fi hot spots in public areas to provide Internet accessibility. Thus

Documenting the Results of Risk Assessment The goal of this process is to recognize the information assets, list them, and rank according to those most required protection. The

QUESTION 1 Risk analysis helps companies prioritize their risks and shows management the amount of money that should be applied to protecting against those risks in a sensib

Computer networks are defined by four factors which are as given below: 1) NETWORK SIZE: According to the size of networks. 1) Local Area Network ( LAN) 2) Wide Area Ne

Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the fram