Point-to-point topology, Computer Network Security


In Point-to-Point topology there are two kind of topologies.

1) STAR topology

2) TREE topology

In star topology each and every computer is connected to a central hub. The interaction takes place through the hub. It is given in the figure below.


1954_Star and Tree Topology.png

In Tree topology every computers are connected to each other in such a way that they create a tree as given in the figure above

Posted Date: 7/30/2012 3:28:05 AM | Location : United States

Related Discussions:- Point-to-point topology, Assignment Help, Ask Question on Point-to-point topology, Get Answer, Expert's Help, Point-to-point topology Discussions

Write discussion on Point-to-point topology
Your posts are moderated
Related Questions
Network-Based IDS (NIDS) A NIDS resides on computer or appliance connected to segment of an organization’s network and looks for signs of attacks. While examining packets, a NID

QUESTION (a) Illustrate the term file carving. (b) What are the basic three main techniques for image steganography? (c) Distinguish between vector graphics and raster

What is the concept of topology?

implementing password policy in organisation

This project involves the design and development of a simulation environment of many sensors tagging material/ machinery/equipment/etc in a warehouse site to help monitor and manag

Question: (a) Explain the following security services: Confidentiality, Availability. (b) Which attack will be used to bypass even the best physical and logical security m

Techniques for combating Spam mails Many anti spam products are commercially available in market. But it should also be noted that no  one technique is a complete solution to

Problem 1: Discuss how TWO of the following gurus have contributed to the Quality Movement, highlighting the major points of their philosophies: (a) Edward Deming (b) Jose

(a) Explain the importance of the Euler Totient function in Cryptography. Calculate Euler Totient function value, φ(1280). (b) Explain the role of the Authentication Server (

QUESTION A small ISP requests your help. The technicians report that they have had no downstream access to the Internet. They believe the problem lies with their access provide