Direct point-to-point communication:, Computer Network Security

Early networks used simple point-to-point communication. In such a method of communication every communication channel connects exactly two devices. In this way it prepares a mesh or point-to-point network, which is given in the figure below.


923_Point to Point communication.png



Direct point-to-point communication has the given advantages:

  • The connection type of individual connections may be distinct.
  • Individual connections may select a different frame format and error detection function etc.
  • It is easy to enforce privacy and security.


Direct point-to-point communication has the given disadvantages:

  • The no. of connections increase more rapidly than the no. of computers
  • For 'n' devices connections = (n^2 - n)/2.
  • Most computers use the similar physical path.
  • Direct point-to-point communication is costly due to a no. of connections.
  • Another disadvantage is that adding a new device to the network needs N-1 new connections as given in the above figure.


Posted Date: 7/30/2012 5:59:08 AM | Location : United States

Related Discussions:- Direct point-to-point communication:, Assignment Help, Ask Question on Direct point-to-point communication:, Get Answer, Expert's Help, Direct point-to-point communication: Discussions

Write discussion on Direct point-to-point communication:
Your posts are moderated
Related Questions
Problem (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Describe how

how much would you charge for minimum 20 pages

Question: (a) Explain how the Diffie-Hellman key establishment protocol works. (b) Prove that the Diffie-Hellman key establishment protocol is vulnerable to a `man in the mi

(a) Using the extended Euclidean algorithm, find the multiplicative inverse of 504 mod 67. (b) Decrypt the following ciphertext, which has been encrypted using Caesar cipher:

Problem (a) Name the various layers of the OSI model. (b) Show, by means of a diagram, how  the TCP/IP  reference model  is different from the OSI-7 reference model? Why is

Problem 1 Solve the following Caesar cipher by showing your working: EM KIUM EM AIE EM KWVYCMZML Problem 2 Compare and contrast between block and stream ciphers, listin

Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th

Need Assignemnt help in Information security assignemnt

MegaCorp INC. is a large manufacturing firm that operates 5 factories in Dallas, 4  factories in Los Angeles, and 5 factories in Albany, New York.  It operates a tightly  connected