Ring topology, Computer Network Security

RING TOPOLOGY

In this topology of network the devices are connected to each other in packed loop. In this network first computer passes data packet to the second and then second sends data packet to third and so on, as given in the diagram.

2029_Ring Topology.png

Like star topology the ring network are also same as ring but not physically

Posted Date: 7/30/2012 6:50:38 AM | Location : United States







Related Discussions:- Ring topology, Assignment Help, Ask Question on Ring topology, Get Answer, Expert's Help, Ring topology Discussions

Write discussion on Ring topology
Your posts are moderated
Related Questions
Title: Perimeter Network Security System Outline Requirements The University is based in Glasgow, and provides higher education services to its students and staff. It is loc

Question: (a) i. Explain what is meant by Discretionary Access Control and Mandatory Access Control ii. Which method would be the most effective to ensure that users do

Explain the architecture of ISDN.....?

QUESTION Testing of a Business Continuity Plan (BCP) does not need to be costly or to interrupt the daily operations of the business. The result of the test should also be look

In the e-mail system, where the e-mail messages are saved and why? E-mail messages are saved in user’s private electronic mailbox. A mailbox refers to a local/domestic hard drive c

Problem (1) - Alice, Bob and Charlie have a secret key a=3, b=4, c=5, respectively. - They want to find a common secret key using Diffie-Hellan key exchange protocol (with g

Question 1 Explain any two types of security policies Question 2 What is security attack? Explain with examples Question 3 Explain different characteristics that i

Question (a) In relation to a TCP segment structure, provide the fields responsible for: i. Connection Management ii. Flow Control iii. Error Control iv. Reliable, in-order

RING TOPOLOGY In this topology of network the devices are connected to each other in packed loop. In this network first computer passes data packet to the second and then seco

(a) Describe RSA encryption. (b) For an RSA encryption the values of the primes are: p=29, q=31. select e=11, evaluate the public and private keys. (c) How can RSA be used fo