Reason for multiple topologies, Computer Network Security

REASON FOR MULTIPLE TOPOLOGIES

Every topology has disadvantages and advantages, which are described below:

IN A RING:

 It is simple to coordinate access to other devices however entire network is disabled if a cable cut happens.

IN A STAR:

 On the other hand only once device is affected when a cable cut happens.

IN A BUS:

 The network uses fewer wires than a star, however entire network is disabled when a cable cut happens.

 

 

Posted Date: 7/30/2012 6:53:50 AM | Location : United States







Related Discussions:- Reason for multiple topologies, Assignment Help, Ask Question on Reason for multiple topologies, Get Answer, Expert's Help, Reason for multiple topologies Discussions

Write discussion on Reason for multiple topologies
Your posts are moderated
Related Questions
Many applications are vulnerable to intrusion attacks and can provide misleading reports about misbehaving nodes. Some of the mechanisms under such a category include the Bayesian

What are Transmission Impairments? Explain the following concepts with respect to Transmission Impairments a) Attenuation b) Delay Distortion c) Noise ion #Minimum 100 words ac

attacks on crytography

Social Network development in Java: Project Title: SUGGESTLOCAL (Nov 2006-April 2007) Role             : Developer Domain        : Social Network Client          :

Illustrate about TinySec Protocol TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer

COMPONENTS OF AN INFORMATION SYSTEM The components of an information system are software, data, hardware, people, procedures and Networks. These 6 components are critical to ena

Q. Secure routing Protocols for Wireless Sensor Networks? A secure routing information protocol enables effective implementation of authentication and integrity checking defens

Question An organization is planning to connect its networks to the Internet. The network is located within a four story building. A web server supporting online sales is also

Question: (a) Your office administrator is being trained to take server backups. Which authorization model could be ideal for this situation: MAC, DAC or RBAC? Justify your a

DEPLOYMENT AND IMPLEMENTING OF AN IDS The strategy for deploying IDS should consider various factors. These factors will determine the number of administrators required to insta