Reason for multiple topologies, Computer Network Security

REASON FOR MULTIPLE TOPOLOGIES

Every topology has disadvantages and advantages, which are described below:

IN A RING:

 It is simple to coordinate access to other devices however entire network is disabled if a cable cut happens.

IN A STAR:

 On the other hand only once device is affected when a cable cut happens.

IN A BUS:

 The network uses fewer wires than a star, however entire network is disabled when a cable cut happens.

 

 

Posted Date: 7/30/2012 6:53:50 AM | Location : United States







Related Discussions:- Reason for multiple topologies, Assignment Help, Ask Question on Reason for multiple topologies, Get Answer, Expert's Help, Reason for multiple topologies Discussions

Write discussion on Reason for multiple topologies
Your posts are moderated
Related Questions
QUESTION (a) Define and distinguish between Electronic Commerce and Electronic Business (b) According to you what are the benefits that Electronic Commerce can brings to org

The "Big Red Rocks" (BRR) mining company is based and operates in Western Australia. They are primarily an iron ore miner, but they also produce electricity through tidal power to

COLLISION DETECTION The signals from two devices will interfere with each other and the overlapping of frames is known a collision. It does not cause to the hardware but data

INFORMATION CLASSIFICATION The classification of information is an important aspect of policy and a control for the information protection. A clean desk policy stipulates that a


Question : Wi-Fi protected access (WPA) was specified by the Wi-Fi alliance with the primary aim of enhancing the security of existing 802.11 networks. However, WPA was only a

WIRELESS SECURITY TOOLS An organization which spends its time securing wired network and leaves wireless networks to operate in any manner is opening itself up for security brea

Problem (a) IT Service Support within the ITIL framework is divided in a number of processes. Compare and contrast the following processes: i. Incident Management and Problem M

Your rules should ensure that Internet access will be restricted to the following: Only the following services will be permitted as OUTBOUND traffic (to the Internet from the DM

Question: (a) State whether the following statements are TRUE or FALSE. Justify your answer. i. A good site security policy will require that users use computer generated p