Reason for multiple topologies, Computer Network Security

REASON FOR MULTIPLE TOPOLOGIES

Every topology has disadvantages and advantages, which are described below:

IN A RING:

 It is simple to coordinate access to other devices however entire network is disabled if a cable cut happens.

IN A STAR:

 On the other hand only once device is affected when a cable cut happens.

IN A BUS:

 The network uses fewer wires than a star, however entire network is disabled when a cable cut happens.

 

 

Posted Date: 7/30/2012 6:53:50 AM | Location : United States







Related Discussions:- Reason for multiple topologies, Assignment Help, Ask Question on Reason for multiple topologies, Get Answer, Expert's Help, Reason for multiple topologies Discussions

Write discussion on Reason for multiple topologies
Your posts are moderated
Related Questions
QUESTION An analog sensor is used to monitor the temperature of sea water at different depth. The sensor is fitted to a buoy and incorporates a wireless transmitter that send

What do you understand by the term encryption? Also describe the public key cryptography Encryption: Encryption is a method of converting plain text into cipher text. Using thi

QUESTION a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a segment. Give the source MAC address in hexadecimal; the source IP address, the uppe

Question 1 a) Provide three advantages of using optical fiber. b) Distinguish between "Direct Sequence Modulation" and "Frequency Hopping" c) Decribe the purpose of using "

QUESTION (a) Consider the following digital bit stream 01001100 is to be encoded in: i. NRZ-I ii. Pseudoternary iii. Manchester iv. Differential Manchester Show th


Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the fram

Using the selected approach, you should then conduct an audit or review of the information security issues associated with the use of computing facility and report on the findings.

UDP ENCAPSULATION As given in the figure below, UDP packet is included in IP datagram and the IP datagram is then attached in the Frame.

Question: (a) Explain and illustrate with a drawing the three-layer feedforward multilayer perceptron neural network. (b) Summarize the standard backpropagation algorithm in