Point-to-point topology, Computer Network Security

POINT-TO-POINT:

In Point-to-Point topology there are two kind of topologies.

1) STAR topology

2) TREE topology

In star topology each and every computer is connected to a central hub. The interaction takes place through the hub. It is given in the figure below.

 

1954_Star and Tree Topology.png

In Tree topology every computers are connected to each other in such a way that they create a tree as given in the figure above

Posted Date: 7/30/2012 3:28:05 AM | Location : United States







Related Discussions:- Point-to-point topology, Assignment Help, Ask Question on Point-to-point topology, Get Answer, Expert's Help, Point-to-point topology Discussions

Write discussion on Point-to-point topology
Your posts are moderated
Related Questions
- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, in that order. - They would like to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

Risk Management Discussion Points Organizations should define level of risk it can live with Risk appetite: it defines quantity and nature of risk which organizations are wil

Scenario: A network with individual hosts (really, virtual machines) can run HTTP (web) servers that are available to the outside. (Here, available means the ability to read and wr

DATAGRAM REASSEMBLY Recreation of original datagram is known as reassembly. Ultimate receiver acts reassembly as given below.Fragments can reach out of order. Header bit check

#Under what circumstances would the use of a SecSDLC be more appropriate than an SDLC?

Problem: (a) Assume that a new application layer protocol is developed for video conferencing application. Which transport layer protocol, between TCP and UDP, will you u

ROUTING TABLE For efficiency, information about forwarding is saved in a routing table, which is started at system initialization and must be updated as network topology modif

(a) Explain the importance of the Euler Totient function in Cryptography. Calculate Euler Totient function value, φ(1280). (b) Explain the role of the Authentication Server (

Problem 1 . Show various features of a 1G network Total three features for each feature of 1G Problem 2. Describe how a cellular network works with functional block diagram