Star topology, Computer Network Security


In Star topology all computers are connected using a central device known as hub. Star networks are one of the most general computer network topologies. In its simplest way, a star network consists of one main hub, switch or computer, which performs as a conduit to transmit packets. This consists of a central node, to which all other packets are connected; this main node gives a common connection point for all devices through a hub. In Star topology each node is transferred to central device known switch or hub. The switch is the server and the peripherals are the users.


2100_Star Topology.png

Posted Date: 8/20/2012 3:11:52 AM | Location : United States

Related Discussions:- Star topology, Assignment Help, Ask Question on Star topology, Get Answer, Expert's Help, Star topology Discussions

Write discussion on Star topology
Your posts are moderated
Related Questions
"Using the CNSS Model, examine each of the cells and write a brief statement on how you would address the components respesented in that cell"

what is the guaranteed quality of this coursework? how many days it take for 10-12 pages? how much will be? thanks

Risk Management Discussion Points Organizations should define level of risk it can live with Risk appetite: it defines quantity and nature of risk which organizations are wil

The Internet is known as the set of networks connected by routers that are configured to pass traffic among any machine attached to any network in the set. By internet several

QUESTION (a) What do you meant by data spoliation? (b) Justify the following statement: "Disk imaging differs from creating a standard backup of disk." (c) Why do yo

POINT-TO-POINT: In Point-to-Point topology there are two kind of topologies. 1) STAR topology 2) TREE topology In star topology each and every computer is connect

(a) Using the extended Euclidean algorithm, find the multiplicative inverse of 504 mod 67. (b) Decrypt the following ciphertext, which has been encrypted using Caesar cipher:

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •    Apply safeguards wh