Ring topology, Computer Network Security

RING TOPOLOGY

In this topology of network the devices are connected to each other in packed loop. In this network first computer passes data packet to the second and then second sends data packet to third and so on, as given in the diagram.

2029_Ring Topology.png

Like star topology the ring network are also same as ring but not physically

Posted Date: 7/30/2012 6:50:38 AM | Location : United States







Related Discussions:- Ring topology, Assignment Help, Ask Question on Ring topology, Get Answer, Expert's Help, Ring topology Discussions

Write discussion on Ring topology
Your posts are moderated
Related Questions
Describe what the FTAM services are. FTAM  stand for the File Transfer Access and Management: FTAM is an ISO application protocol which performs the operations on files such as.

Question: (a) Describe how IPSec provides data source authentication. (b) Which protocol can be used to provide limited traffic analysis confidentiality? Why is it "limite

Explain how can we achieved privacy in an e-mail system.  The full form of PEM is Privacy Enhanced Mail: PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted

QUESTION (a) Consider the following authentication options A. Using password B. Using pin and fingerprint Which option A or B provides stronger security and why? (b

Screened Subnet Architecture This setup provides an extra security layer to screened host architecture by creating a perimeter subnet which further isolates internal network f

Security Clearances For a security clearance in organizations each data user should be assigned a single level of authorization indicating classification level. Before approachi

how to link html with a data base

QUESTION (a) What do you meant by data spoliation? (b) Justify the following statement: "Disk imaging differs from creating a standard backup of disk." (c) Why do yo

This project involves the design and development of a simulation environment of many sensors tagging material/ machinery/equipment/etc in a warehouse site to help monitor and manag

QUESTION (a) FTP is a protocol used for the delivery of files across networks. Explain how FTP works (support your answer with a diagram). (b) How does TCP perform the gi