Ring topology, Computer Network Security

RING TOPOLOGY

In this topology of network the devices are connected to each other in packed loop. In this network first computer passes data packet to the second and then second sends data packet to third and so on, as given in the diagram.

2029_Ring Topology.png

Like star topology the ring network are also same as ring but not physically

Posted Date: 7/30/2012 6:50:38 AM | Location : United States







Related Discussions:- Ring topology, Assignment Help, Ask Question on Ring topology, Get Answer, Expert's Help, Ring topology Discussions

Write discussion on Ring topology
Your posts are moderated
Related Questions
Example : UCSF Medical Center In the year 2002, the University of California, San Francisco (UCSF) Medical Center received an email message from someone who claimed to be a doct

RISK ASSESSMENT Risk assessment is a step in a risk management technique. Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete

ARP RESPONSES Let's search out how does a computer know whether an incoming frame have an ARP message. The type field in the frame header defines that the frame contain an ARP

FRAGMENTATION Fragmentation information is kept in different extension header.  Every fragment has base header and fragmentation header. Whole datagram including original hea

PACKETS: Packet is a generic word that define to small code of data. Packet have different format. Each hardware needs different packet format.  FRAME: A hardware frame or

Question: a) What do you meant by Privacy? b) Name the four privacy violations. c) Often, aggregate information and anonymized information can be combined to identif

You are hired as a consultant to help design a digital library in which books are scanned and stored digitally and made available to users of the World Wide Web. Assume that the li

QUESTION: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume that the signal level for a space in NRZ-L is positive; the signal level f

Problem (a) IT Service Support within the ITIL framework is divided in a number of processes. Compare and contrast the following processes: i. Incident Management and Problem M

Question: (a) Besides privacy, what other security functions does Pretty Good Privacy (PGP) provides? (b) What is the Post Office Protocol (POP) used for? Why is it impo