Star topology, Computer Network Security

STAR TOPOLOGY

In this topology, all devices are attached to a central point, which is sometimes known as the "Hub" as given in the diagram below.

2452_Star topology.png

 

Figure: An idealized star network

It is very important to show that these networks are not physically like stars but they are seems like stars. It defines that their shape does not seems like a star but their connections are just same as a star. The above figure is idealized. Here is given a star network in practice in the diagram below:

 

1758_Star topology practice.png

Posted Date: 7/30/2012 6:48:55 AM | Location : United States







Related Discussions:- Star topology, Assignment Help, Ask Question on Star topology, Get Answer, Expert's Help, Star topology Discussions

Write discussion on Star topology
Your posts are moderated
Related Questions
?Examples should include direct costs items, indirect costs items, as well as variable costing. ?What are at least 5 types of expenses that are associated with manufacturing the

Question: (a) Describe fully with example the two access control methods available to implement database security. (b) Discuss why database statistics (meta data) provide es

QUESTION: (a) Explain, with the aid of a diagram, a Star topology of a network of your choice. (b) Illustrate on the use of a MAN and give an example of one. (c) Describe

SHIFT OPERATION:  This operation replaced all bits to the left one position. For example in the diagram below a 16-bit CRC hardware is given, which needs three Exclusive OR (

Question 1:  Describe the functioning of cloud computing. Question 2: Discuss on "Platform as a Service". Question 3: Discuss the steps involved in effective co

CRC can detect the following errors better than check sums. a) Vertical errors b) Burst errors a) VERTICAL ERRORS:  This kind of error happens due to a hardware fai

Screened Subnet Architecture This setup provides an extra security layer to screened host architecture by creating a perimeter subnet which further isolates internal network f

DATAGRAM REASSEMBLY Recreation of original datagram is known as reassembly. Ultimate receiver acts reassembly as given below.Fragments can reach out of order. Header bit check

Question 1: Why do we need a Law of Contract? a Explanation Reasons to have a law of contract b Explain the close procurement project process - Explanation (causes,

Problem 1: What is the function of AUC in the GSM architecture? Explanation of HLR(AUC) Architecture of GSM Problem 2: Show the layered architecture of t