Direct point-to-point communication:, Computer Network Security

Early networks used simple point-to-point communication. In such a method of communication every communication channel connects exactly two devices. In this way it prepares a mesh or point-to-point network, which is given in the figure below.

 

923_Point to Point communication.png

 

ADVANTAGES:

Direct point-to-point communication has the given advantages:

  • The connection type of individual connections may be distinct.
  • Individual connections may select a different frame format and error detection function etc.
  • It is easy to enforce privacy and security.

DISADVANTAGES:

Direct point-to-point communication has the given disadvantages:

  • The no. of connections increase more rapidly than the no. of computers
  • For 'n' devices connections = (n^2 - n)/2.
  • Most computers use the similar physical path.
  • Direct point-to-point communication is costly due to a no. of connections.
  • Another disadvantage is that adding a new device to the network needs N-1 new connections as given in the above figure.

 

Posted Date: 7/30/2012 5:59:08 AM | Location : United States







Related Discussions:- Direct point-to-point communication:, Assignment Help, Ask Question on Direct point-to-point communication:, Get Answer, Expert's Help, Direct point-to-point communication: Discussions

Write discussion on Direct point-to-point communication:
Your posts are moderated
Related Questions
Government funding has been given to a university consortium establishing a repository of resources for school teachers. They have engaged you to develop a search facility for teac

Identify Possible Controls For each threat and linked vulnerabilities which have residual risk, create primary list of control ideas. Residual risk is the risk which remains to

Problem 1 Solve the following Caesar cipher by showing your working: EM KIUM EM AIE EM KWVYCMZML Problem 2 Compare and contrast between block and stream ciphers, listin

Encode the following plaintext, using the Caesar cipher: LORD OF THE RINGS b) The following ciphertext jw njbh lxmn cx kanjt has been encoded using a

Question: (a) What is Network Address Translation (NAT)? Why is it used? (b) Given a following information by your ISP about your newly acquired Frame Relay connection:

Hello i have submitted an assignment and i am still waiting to know if it has been accepted or not the ref number is TicketID: EM201381BRY525CN, the due date is for monday 27th of

Techniques for combating Spam mails Many anti spam products are commercially available in market. But it should also be noted that no  one technique is a complete solution to

Data Classification and Management Corporate and military organizations use a several of classification schemes. Information owners are responsible for classifying information a

What do you understand by cryptanalysis? Discuss about the transposition ciphers substitution cipher, and onetime pads. The messages which are intended to transmit secretly and

FRAGMENTATION AND PATH MTU IPv6 source is responsible for fragmentation. Routers simply drop datagrams bigger than network MTU. So source have to fragment datagram to arrive d