Direct point-to-point communication:, Computer Network Security

Early networks used simple point-to-point communication. In such a method of communication every communication channel connects exactly two devices. In this way it prepares a mesh or point-to-point network, which is given in the figure below.

 

923_Point to Point communication.png

 

ADVANTAGES:

Direct point-to-point communication has the given advantages:

  • The connection type of individual connections may be distinct.
  • Individual connections may select a different frame format and error detection function etc.
  • It is easy to enforce privacy and security.

DISADVANTAGES:

Direct point-to-point communication has the given disadvantages:

  • The no. of connections increase more rapidly than the no. of computers
  • For 'n' devices connections = (n^2 - n)/2.
  • Most computers use the similar physical path.
  • Direct point-to-point communication is costly due to a no. of connections.
  • Another disadvantage is that adding a new device to the network needs N-1 new connections as given in the above figure.

 

Posted Date: 7/30/2012 5:59:08 AM | Location : United States







Related Discussions:- Direct point-to-point communication:, Assignment Help, Ask Question on Direct point-to-point communication:, Get Answer, Expert's Help, Direct point-to-point communication: Discussions

Write discussion on Direct point-to-point communication:
Your posts are moderated
Related Questions
What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

(a) Describe the concept of zero knowledge proofs. Give a practical example. (b) Explain how a one way hash function works. (c) What are message authentication codes? (d)

Unguided Media This is the wireless media that transfer electromagnetic waves without using a physical media. Waves are broadcast through the air. This is performing through r

Risk Identification Risk management comprises of identifying, classifying and prioritizing organization’s information assets, threats and vulnerabilities also. Risk Identificati

Symmetric Encryption This encryption method makes use of same “secret key” to encipher and decipher the message and it is termed as private key encryption. This type of encrypti

Question: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

Question 1: (a) Differentiate between symmetric and asymmetric encryption system. (b) Describe how a digital signature is created. (c) Explain briefly what SSL (secure so

Question: (a) Besides privacy, what other security functions does Pretty Good Privacy (PGP) provides? (b) What is the Post Office Protocol (POP) used for? Why is it impo

TCP and UDP End-to-end delivery application is connection less. The basic function of connectionless service are as given: It adds extension of LAN abstraction. It has simp

The Internet is known as the set of networks connected by routers that are configured to pass traffic among any machine attached to any network in the set. By internet several