Direct point-to-point communication:, Computer Network Security

Early networks used simple point-to-point communication. In such a method of communication every communication channel connects exactly two devices. In this way it prepares a mesh or point-to-point network, which is given in the figure below.

 

923_Point to Point communication.png

 

ADVANTAGES:

Direct point-to-point communication has the given advantages:

  • The connection type of individual connections may be distinct.
  • Individual connections may select a different frame format and error detection function etc.
  • It is easy to enforce privacy and security.

DISADVANTAGES:

Direct point-to-point communication has the given disadvantages:

  • The no. of connections increase more rapidly than the no. of computers
  • For 'n' devices connections = (n^2 - n)/2.
  • Most computers use the similar physical path.
  • Direct point-to-point communication is costly due to a no. of connections.
  • Another disadvantage is that adding a new device to the network needs N-1 new connections as given in the above figure.

 

Posted Date: 7/30/2012 5:59:08 AM | Location : United States







Related Discussions:- Direct point-to-point communication:, Assignment Help, Ask Question on Direct point-to-point communication:, Get Answer, Expert's Help, Direct point-to-point communication: Discussions

Write discussion on Direct point-to-point communication:
Your posts are moderated
Related Questions
QUESTION (a) (i) Describe Phishing attacks. (ii) Distinguish between Phishing and Spear Phishing attacks. (b) Describe two instances where an attacker sniffing on a netwo

Project Name : Computer Adaptive Test Role : Day to Day interaction with Client. Involved in Requirement Gathering, Estimation.Involved with Stellent design and architectur

Access Controls Access controls addresses admission of a user into a trusted area of organization. It comprises of a combination of policies & technologies. The ways to control

QUESTION (a) Compare and contrast phishing and pharming attacks (b) Nowadays, web defacement may not always be visual (i) Explain web defacement (ii) What is the main

Encryption Key Size When using ciphers, the size of crypto variable or key is quite important as the strength of many encryption applications and cryptosystems were measured by

Question: (a) Draw the waveform for an asynchronous transmission with the following specifications: Character "H", one even parity bit, one start bit, one stop bit, and a b

Guided Media These are those that give a conduit from one machine to another that add twisted-pair, fiber-optic cable and coaxial cable. A signal traveling along any of these

a) determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Assume a one-way propagati

Question : (a) Distinguish between authorization and authentication. (b) SSO (Single Sign On) implies a user logs in once and can access resources for a defined period of

FRAGMENT IDENTIFICATION: IDENT field in every fragment matches IDENT field in real datagram. Fragments from different datagrams may arrive out of order and still be saved out.