Reason for multiple topologies, Computer Network Security

REASON FOR MULTIPLE TOPOLOGIES

Every topology has disadvantages and advantages, which are described below:

IN A RING:

 It is simple to coordinate access to other devices however entire network is disabled if a cable cut happens.

IN A STAR:

 On the other hand only once device is affected when a cable cut happens.

IN A BUS:

 The network uses fewer wires than a star, however entire network is disabled when a cable cut happens.

 

 

Posted Date: 7/30/2012 6:53:50 AM | Location : United States







Related Discussions:- Reason for multiple topologies, Assignment Help, Ask Question on Reason for multiple topologies, Get Answer, Expert's Help, Reason for multiple topologies Discussions

Write discussion on Reason for multiple topologies
Your posts are moderated
Related Questions
Short term Scheduler function , also shown as a dispatcher runs most frequently, and creates the finest-grained decision of which program could run next. This scheduler is called

What is information Information comprises the meanings and interpretations which people place upon the facts, or data. The value of information springs from the ways it can be i

Topic -Spam is an ever-growing problem, with some network administrators reporting that 90% or moreof the email delivered to their mail servers is spam. Identify and briefly evalua

Gateways They transfer packets among network machines that have different protocols (e.g. between a WAN and a LAN). They access a packet formatted for one protocol and change

Question: (a) Besides privacy, what other security functions does Pretty Good Privacy (PGP) provides? (b) What is the Post Office Protocol (POP) used for? Why is it impo

There is another probing methods i-e Trace Route. To get more detail it is used     As given in the figure about the route to DANDELION-PATCH.MIT.EDU was looked out a


REASON FOR MULTIPLE TOPOLOGIES Every topology has disadvantages and advantages, which are described below: IN A RING:  It is simple to coordinate access to other dev

People,Procedures,Data Asset Identification-Risk Management The human resources, data information and documentation assets are more difficult to identify. People having knowle

In broadcast topology there are further two types 1) SATELLITE\RADIO 2) RING TOPOLOGY In a radio or satellite topology every computers are connected to each other via radio o