Star topology, Computer Network Security

STAR TOPOLOGY

In this topology, all devices are attached to a central point, which is sometimes known as the "Hub" as given in the diagram below.

2452_Star topology.png

 

Figure: An idealized star network

It is very important to show that these networks are not physically like stars but they are seems like stars. It defines that their shape does not seems like a star but their connections are just same as a star. The above figure is idealized. Here is given a star network in practice in the diagram below:

 

1758_Star topology practice.png

Posted Date: 7/30/2012 6:48:55 AM | Location : United States







Related Discussions:- Star topology, Assignment Help, Ask Question on Star topology, Get Answer, Expert's Help, Star topology Discussions

Write discussion on Star topology
Your posts are moderated
Related Questions
QUESTION 1 Using a real life scenario or context list and set the scene for at least four advantages that an organized incident response program promotes. QUESTION 2 Yo

Explain the architecture of ISDN.....?

how can i start thesis? Please mention so of examples?

BALANCING SECURITY AND ACCESS Even with best planning and implementation, it is impossible to obtain perfect security, that is, it is a process, not an absolute. Security should

TRANSPORT PROTOCOLS: Give application-to-application communication. Require extended addressing mechanisms to check applications. Are known end-to-end communicatio

QUESTION (a) Consider the following authentication options A. Using password B. Using pin and fingerprint Which option A or B provides stronger security and why? (b

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption te

"Using the CNSS Model, examine each of the cells and write a brief statement on how you would address the components respesented in that cell"

Discuss how developers should apply the following countermeasures to improve the security of their code:

Write down the significance of the syntax conversion . Syntax Conversion is described below: Syntax conversion is a significant function carried out in the presentation layer. I