Point-to-point topology, Computer Network Security

POINT-TO-POINT:

In Point-to-Point topology there are two kind of topologies.

1) STAR topology

2) TREE topology

In star topology each and every computer is connected to a central hub. The interaction takes place through the hub. It is given in the figure below.

 

1954_Star and Tree Topology.png

In Tree topology every computers are connected to each other in such a way that they create a tree as given in the figure above

Posted Date: 7/30/2012 3:28:05 AM | Location : United States







Related Discussions:- Point-to-point topology, Assignment Help, Ask Question on Point-to-point topology, Get Answer, Expert's Help, Point-to-point topology Discussions

Write discussion on Point-to-point topology
Your posts are moderated
Related Questions
Problem 1 . Show various features of a 1G network Total three features for each feature of 1G Problem 2. Describe how a cellular network works with functional block diagram

Problem (a) Using Vigenère cipher and given the key abc, find the ciphertext for the message: simplicity Only the 26 lower-case alphabetical characters are used in messa

QUESTION A small ISP requests your help. The technicians report that they have had no downstream access to the Internet. They believe the problem lies with their access provide

You have been asked to setup a remote temperature sensing system for an electric furnace. The system consists of a sensor unit which feeds an analogue signal to a PCM encoder. The

a) Calculate the CRC for the frame below: Frame: 1101011011 Generator: 10011 Message after appending 4 zero bits: 11010110110000 b) OSI refers to a system in which any

(a) Describe briefly the difference between flow control and congestion control in relation to a connection-oriented protocol such as TCP. (b)  What is the initial rate of data

You are provided with 3000 sample keystrokes for 5 users mentioned above. You can find this data using the ‘Lab 2 User Data' link in the ‘Lab 2' folder on Blackboard. Please note t

VULNERABILITY SCANNERS Active vulnerability scanners scan networks for detailed information, it initiate traffic to determine security holes. This scanner identifies usernames a

Netfilter Firewall Netfilter is the popular name for the packet filtering system installed by default in the Linux kernel. The filtering system can be used as a very effective

IPV6 DATAGRAM FORMAT It is given in the figure below: