Ring topology, Computer Network Security

RING TOPOLOGY

In this topology of network the devices are connected to each other in packed loop. In this network first computer passes data packet to the second and then second sends data packet to third and so on, as given in the diagram.

2029_Ring Topology.png

Like star topology the ring network are also same as ring but not physically

Posted Date: 7/30/2012 6:50:38 AM | Location : United States







Related Discussions:- Ring topology, Assignment Help, Ask Question on Ring topology, Get Answer, Expert's Help, Ring topology Discussions

Write discussion on Ring topology
Your posts are moderated
Related Questions
Question 1 a) What is a NMS? Question 2 Explain about Structure of Management Information Question 3 A)In which UDP port number does a protocol entity receive message?

Your rules should ensure that Internet access will be restricted to the following: Only the following services will be permitted as OUTBOUND traffic (to the Internet from the DM

Explain how can we achieved privacy in an e-mail system.  The full form of PEM is Privacy Enhanced Mail: PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted

Explain the architecture of ISDN.....?

Example 3: Logic bombs In the year 2000, Timothy Lloyd was found responsible of causing $10 million and $12 million of damage to Omega Engineering, an American company specializ

Systems-Specific Policy (SysSP) SysSPs are codified as standards and procedures which are used when configuring or maintaining systems. Systems specific policies fall into 2 g

QUESTION (a) One of the biggest drawbacks that GNS3 has is that it supports only the IOS images of routers. This means that users cannot emulate Cisco switches. Suggest two sol

The Role of the Investigation The first phase, investigation is the most significant. What problem is the system being developed to solve? During investigation phase, objectives

Evaluations, Assessment, and Maintenance of Risk Controls When the control strategy has been implemented, it should be monitored and measured on an ongoing basis to determine ef

What are the main differences between TCP/IP vs OSI?