Star topology, Computer Network Security

STAR TOPOLOGY

In this topology, all devices are attached to a central point, which is sometimes known as the "Hub" as given in the diagram below.

2452_Star topology.png

 

Figure: An idealized star network

It is very important to show that these networks are not physically like stars but they are seems like stars. It defines that their shape does not seems like a star but their connections are just same as a star. The above figure is idealized. Here is given a star network in practice in the diagram below:

 

1758_Star topology practice.png

Posted Date: 7/30/2012 6:48:55 AM | Location : United States







Related Discussions:- Star topology, Assignment Help, Ask Question on Star topology, Get Answer, Expert's Help, Star topology Discussions

Write discussion on Star topology
Your posts are moderated
Related Questions
how can you enter the ASVAB practice test on line?

SECURING THE COMPONENTS Computer can be subject of an attack or the object of an attack. When subject of an attack, computer is used as lively tool to conduct attack. The figure

Question 1 Explain any two types of security policies Question 2 What is security attack? Explain with examples Question 3 Explain different characteristics that i

Question: (a) i. Explain what is meant by Discretionary Access Control and Mandatory Access Control ii. Which method would be the most effective to ensure that users do


ADDRESS RESOLUTION WITH MESSAGE EXCHANGE An alternative to local calculation is a distributed function. A computer that requires to find an address transmits a message across

Electronic Mail: Electronic mail which is famous as e-mail, as it is known to its number of users, has been around for more than two decades. Before 1990, it was mainly used in

In the e-mail system, where the e-mail messages are saved and why? E-mail messages are saved in user’s private electronic mailbox. A mailbox refers to a local/domestic hard drive c

how would land elevation have canged if coronado had traveled 150 miles due west from what is today arizona instead of west toward new mexico

Elements of Cryptosystems Cryptosystems is characteristically made up of algorithms, data handling techniques, and procedures which are combined in multiple ways to ensure confi