Point-to-point topology, Computer Network Security

POINT-TO-POINT:

In Point-to-Point topology there are two kind of topologies.

1) STAR topology

2) TREE topology

In star topology each and every computer is connected to a central hub. The interaction takes place through the hub. It is given in the figure below.

 

1954_Star and Tree Topology.png

In Tree topology every computers are connected to each other in such a way that they create a tree as given in the figure above

Posted Date: 7/30/2012 3:28:05 AM | Location : United States







Related Discussions:- Point-to-point topology, Assignment Help, Ask Question on Point-to-point topology, Get Answer, Expert's Help, Point-to-point topology Discussions

Write discussion on Point-to-point topology
Your posts are moderated
Related Questions
Q. Develop a completely secure WSN based on the triple key? Wireless network is the most vulnerable type of network to security attack. Unauthorized access to wireless network

every time i connect to WIFI the UC goes directly to 100% then i doesn''t want to come down. what shall i do ?

Secure Socket Layer (SSL) accepts a combination of asymmetric and symmetric (public-key) encryption to accomplish integrity, confidentiality, authentication and non-repudiation for

Question: (a) What are the various options to mitigate risks in an Information Security Management System (ISMS)? For each option specify an instance where it can be used.

CRC in matlab

Selecting a Risk Control Strategy Risk controls involve selecting one of the 4 risk control strategies for every vulnerability. The flowchart is shown in the figure given below

COLLISION: The receiver can get simultaneous requests, which gives in collision at receivers and both service lost and in this way no transmitter accepts reservations and both use

TRANSPORT PROTOCOLS: Give application-to-application communication. Require extended addressing mechanisms to check applications. Are known end-to-end communicatio

BUSINESS NEEDS Information security performs four main functions for an organization. 1. Protects the ability of organization to function. 2. Enables safe operation of applicat

Question: Human telephone conversations are characterized by irregular pauses, alternating with irregular bursts of speech. In contrast, communication via computers is char