Ring topology, Computer Network Security

 

RING topology all computers are connected in loop. A ring topology is a network topology in which every node connects to exactly two other devices, forming a single continuous pathway for ways through each device - a ring. Data transfer from device to device, with each node along the way handling every message. Because a ring topology gives only one pathway between any two ways, ring networks can be disrupted by the end of a single link. A node end or cable break might isolate each node attached to the ring.

 

1094_RingTopology.png

Posted Date: 8/20/2012 3:13:12 AM | Location : United States







Related Discussions:- Ring topology, Assignment Help, Ask Question on Ring topology, Get Answer, Expert's Help, Ring topology Discussions

Write discussion on Ring topology
Your posts are moderated
Related Questions
Ask question #Minimum.. 100 words accepted#

Task 1 a. Consider the table showing the relative frequencies of letters in English. Arrange the frequencies from largest to smallest, and make a cumulative plot, using Exc

Question: (a) Distinguish between a mobile agent "state" and "code". (b) Differentiate between "weak" and "strong" mobility. (c) Mobile agent systems are known to have

Digital Certificates Digital Certificates are electronic document having key value and identifying information about entity which controls key. Digital signature which is attach

Network Virtual Terminal It is a set of principles describing a very simple virtual terminal interaction. The NVT is needed in the start of a Telnet session. Communication wit

(a) Describe RSA encryption. (b) For an RSA encryption the values of the primes are: p=29, q=31. select e=11, evaluate the public and private keys. (c) How can RSA be used fo

THREADS AND ATTACKS Threat is an object, person, or other entity which represents a constant danger to an asset. To make sound decisions about information security, management s

Question (a) A CRC is constructed to generate a 4-bit FCS for an 11-bit message. The divisor polynomial is X 4 + X 3 + 1 (i) Encode the data bit sequence 00111011001 using po

Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the fram

Digital Signatures Digital Signatures are encrypted messages which can be proven mathematically to be authentic. These are created in response to rising requirement to verify in