Reason for multiple topologies, Computer Network Security

REASON FOR MULTIPLE TOPOLOGIES

Every topology has disadvantages and advantages, which are described below:

IN A RING:

 It is simple to coordinate access to other devices however entire network is disabled if a cable cut happens.

IN A STAR:

 On the other hand only once device is affected when a cable cut happens.

IN A BUS:

 The network uses fewer wires than a star, however entire network is disabled when a cable cut happens.

 

 

Posted Date: 7/30/2012 6:53:50 AM | Location : United States







Related Discussions:- Reason for multiple topologies, Assignment Help, Ask Question on Reason for multiple topologies, Get Answer, Expert's Help, Reason for multiple topologies Discussions

Write discussion on Reason for multiple topologies
Your posts are moderated
Related Questions
why is it that sometime we put password in our account to login or signup and it would not work?

Question 1: Why do we need a Law of Contract? a Explanation Reasons to have a law of contract b Explain the close procurement project process - Explanation (causes,

ADDRESS RESOLUTION WITH MESSAGE EXCHANGE An alternative to local calculation is a distributed function. A computer that requires to find an address transmits a message across

IPv6 ADDRESSING IPv6 has 128-bit addresses. A 128-bit address adds network prefix and host suffix. An benefit of IPv6 addressing is that there is address classes i.e. prefix/s

(a) Describe briefly the difference between flow control and congestion control in relation to a connection-oriented protocol such as TCP. (b)  What is the initial rate of data

Ask quIf you are pinging a web server from a user’s client PC, how might the statistical information provided by ping be useful to you?estion #Minimum 100 words accepted#

This project involves the design and development of a simulation environment of many sensors tagging material/ machinery/equipment/etc in a warehouse site to help monitor and manag

What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

QUESTION (a) Compare and contrast phishing and pharming attacks (b) Nowadays, web defacement may not always be visual (i) Explain web defacement (ii) What is the main

ADDRESS RESOLUTION PROTOCOL (ARP) TCP/IP can use any of the three address resolution functions relaying on the addressing procedure used by the underlying hardware. To guarant