Ring topology, Computer Network Security

 

RING topology all computers are connected in loop. A ring topology is a network topology in which every node connects to exactly two other devices, forming a single continuous pathway for ways through each device - a ring. Data transfer from device to device, with each node along the way handling every message. Because a ring topology gives only one pathway between any two ways, ring networks can be disrupted by the end of a single link. A node end or cable break might isolate each node attached to the ring.

 

1094_RingTopology.png

Posted Date: 8/20/2012 3:13:12 AM | Location : United States







Related Discussions:- Ring topology, Assignment Help, Ask Question on Ring topology, Get Answer, Expert's Help, Ring topology Discussions

Write discussion on Ring topology
Your posts are moderated
Related Questions
Ethernet is a commonly used LAN technology. It was discovered at EXROX PARC(Palo Alto Research Center) in 1970s.Xerox, Intel and Digital described it in a standard so it is also kn

(a) Using the extended Euclidean algorithm, find the multiplicative inverse of 504 mod 67. (b) Decrypt the following ciphertext, which has been encrypted using Caesar cipher:

Digital Certificates Digital Certificates are electronic document having key value and identifying information about entity which controls key. Digital signature which is attach

QUESTION Testing of a Business Continuity Plan (BCP) does not need to be costly or to interrupt the daily operations of the business. The result of the test should also be look

Question: a) How many bits per second can be sent on a noiseless 4 MHz channel if four-level digital signals are used? b) If a binary signal is sent over a 3 KHz channel who

You are provided with 3000 sample keystrokes for 5 users mentioned above. You can find this data using the ‘Lab 2 User Data' link in the ‘Lab 2' folder on Blackboard. Please note t

(a) (i) If m = p·q·r where p, q, and r are prime numbers, what is Φ(m)? (ii) Therefore, Determine Φ(440). (b) Describe the following terms as used in cryptography: (i)

discuss the merits and demerits of computers freezing

For simplicity, each character is regarded as one data packet, which means that the data in each packet should have the max length of only 1 byte. Your own packet header (not th

(a) Mention the five main security services. (b) What is a passive attack? Give an example of passive attack? (c) What four types of active attacks and mention their respecti