Point-to-point topology, Computer Network Security

POINT-TO-POINT:

In Point-to-Point topology there are two kind of topologies.

1) STAR topology

2) TREE topology

In star topology each and every computer is connected to a central hub. The interaction takes place through the hub. It is given in the figure below.

 

1954_Star and Tree Topology.png

In Tree topology every computers are connected to each other in such a way that they create a tree as given in the figure above

Posted Date: 7/30/2012 3:28:05 AM | Location : United States







Related Discussions:- Point-to-point topology, Assignment Help, Ask Question on Point-to-point topology, Get Answer, Expert's Help, Point-to-point topology Discussions

Write discussion on Point-to-point topology
Your posts are moderated
Related Questions
Q. Analysis of the Problem of cyber attack? According to the case, The EZ Company is a prominent organization specialized in information integration and visualization technolog

Address resolution algorithms may be grouped into three basic types: Table lookup Closed-form computation Message Exchange 1. TABLE LOOKUP: In Table Loo

Symmetric Encryption This encryption method makes use of same “secret key” to encipher and decipher the message and it is termed as private key encryption. This type of encrypti

Example : Softbank – theft of consumer data for extortion Softbank of Japan offers broadband Internet services across Japan through 2 subsidiaries – Yahoo! BB and Softbank BB. I

Question: (a) What is the use of digital certificate? (b) What is meant by a hierarchical trust model in a Public Key Infrastructure? How does the Pretty Good Privacy (PG

ROUTING TABLE For efficiency, information about forwarding is saved in a routing table, which is started at system initialization and must be updated as network topology modif

Question : (a) Distinguish between authorization and authentication. (b) SSO (Single Sign On) implies a user logs in once and can access resources for a defined period of

Question: (a) Explain the following terms: Information Communication Technology, Operating System and Application Software. (b) Define what a computer is, give four anatomi

Problem 1 . Show various features of a 1G network Total three features for each feature of 1G Problem 2. Describe how a cellular network works with functional block diagram

Detect each visit to www.google.com that is made by the machine. o Send an alert when an activity relating to network chat is detected. o Send an alert when an attempt is made for